Top Banner
Digital Signature Technologies & Applications Ed Jensen Fall 2013
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Digital Signature Technologies & ApplicationsEd JensenFall 2013

Page 2: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

The Signature

• Been around for centuries

• Used to establish authenticity of documents• Loan documents• Contracts• Declaration of Independence

Page 3: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Digital Signature

• Digital Certificate“a document that gives the name of a true party, that true party’s public key, and other information: used in authentication.” (Panko 2013)

• Digital Signature“a calculation added to a plaintext message to authenticate it” (Panko 2013)

Page 4: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

How it works

Three Elements of a Digital Signature

• Keys• Public Key• Private Key

• Signature• Signature Verification

Page 5: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

How it works (cont)

• Key Generation Algorithm• Public Key generated and stored• Private Key generated and issued to user

• Signing Algorithm

• Signature Verification Algorithm

Page 6: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

How it works (cont)

• Certification Authorities• Accept applications• Issue Certificates• Maintain Certificate Status and other Data

Page 7: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

How it works (cont)

• Role of Certification Authorities• Verify Identity of applicant• Ensure identity integrity• Attest to identity of applicant

Page 8: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Uses

• Authentication

• Integrity

• Nonrepudiation

Page 9: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Risks

• Security

• Stolen or Mistaken Identities

• Computation Power

Page 10: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Benefits

• Enhance security

• Going Paperless• Physical space• Cost savings

• Economic Development

Page 11: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Legal Considerations

• Federal ESIGN Act of 2000

• Legally Binding Contracts

• Liability of CA

Page 12: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Current Applications/Services

Page 13: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

The Future

• Business transactions between individuals and government

• Government to government transactions

Page 14: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Summary

• We have a need to validate and authenticate electronic documents

• Digital Signatures can meet that need• Risks (security, stolen identity, computation power)• Benefits (enhance security, paperless, economic

development)• ESIGN Act of 2000 (legally binding contract, CA

liability)• The Future (individual to government, government to

government)

Page 15: Digital Signature Technologies & Applications Ed Jensen Fall 2013.

Questions?