Preview

digital signature

Good Essays
Open Document
Open Document
628 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
digital signature
Digital Signature Act 1997

The primary intent of the Digital Signature Act 1997 is to regulate the use of digital signatures and to provide for matters connected therewith.
We start with the privacy implications of digital signatures in general. A digital signature is a 'message digest' encrypted using the sender's private key.
The recipient can recreate the message digest from the message they receive using the sender's public key. He can then compare the two results to satisfy himself that the contents of the message received is the same as that which was sent (data integrity) but also that the message have been sent by the purported sender (sender authentication) and that the sender cannot later deny that he did not send the message (non-repudiation). Digital signatures are subject to a form of 'spoofing' by the creation of a bogus public key that purports to be that of a particular person. To address that risk, a certification authority's (CAs) duty is to certify that a public key is that of a particular person. The current practice is to use separate key-pairs for encryption of message content and for digital signatures. The OECD encryption guideline states that this distinction should be taken into account in development of national policies on access to keys.

The first concern is regarding how private keys are generated. For security reasons, it is therefore essential that key-generation is undertaken entirely under the control of the individual concerned, and that the private key never leaves the possession of that person without strong security precautions being taken. If any other approach is used, serious privacy and security issues arise because there is opportunity for the individual to be convincingly impersonated. The second concern relates to how the private keys are stored and backed-up and how back-up copies are stored. In most cases, other organizations are involved and therefore the private key must be subject of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Holocaust is one of the most devastating and terrifying instances in the world’s history. It is mostly known for what Adolf Hitler wanted done, but the ones that are guilty for it even happening are that supported the Nazi regime and what it was doing. Throughout Hannah Arendt’s book she only talks about the people that supported the regime and took orders form it telling them to have millions of Jews sent to concentration camps. While their millions of those Jews never made it out because of the fact that they had gotten sick or they had some physical problems, so the people that were in charge of the prison camps had orders to have those sick or injured people sent to death camps. Those people…

    • 1044 Words
    • 5 Pages
    Good Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    The certificate authority (CA) is the trusted authority for certifying individuals' identities and creating an electronic document indicating that individuals are who they say they are.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    The information is stored in locked filing cabinets as the information can hold company details and account numbers this is only accessible by the Administration staff and each file is signed out on a register.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Study guide for exam 3

    • 3836 Words
    • 13 Pages

    authority of an agent to do any act that, according to the custom of the community, usually accompanies the transaction for which the agent is authorized to act.…

    • 3836 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    This paper will cover the eight great sign miracles that Jesus performed that was listed by Dr. Towns. These miracles are also recorded in the Gospel of John and will be outlined below.…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    a scheduled drive for any reason. I realize that if proper 24-hour notice is not…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    First of all, which cryptographic technique can be used to verify the identity of a message's sender?…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2014 Signature Assignment

    • 617 Words
    • 2 Pages

    Directions: This assignment will require that you read the following vignette carefully and answer the questions at the end of the vignette by writing a complete, full essay response. You are allowed to use you book as a resource and a trustworthy, peer reviewed source (optional). Your written essay should be typed, the main body be two to three pages in length and written in APA style/ format. You must have a cover page, the main body (essay) and a separate reference/s page. You will find it helpful to search for APA guidelines in the Internet.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Allensmith, S. C. (n.d.). Understanding Face Recognition Systems . (Course Technology ) Retrieved Sept. 16, 2014…

    • 325 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Motivation and the Brain

    • 1465 Words
    • 6 Pages

    CERTIFICATE OF ORIGINALITY: I certify that the attached paper, which was produced for the class identified above, is my original work and has not previously been submitted by me or by anyone else for any class. I further declare that I have cited all sources from which I used language, ideas and information, whether quoted verbatim or paraphrased, and that any and all assistance of any kind, which I received while producing this paper, has been acknowledged in the References section. This paper includes no trademarked material, logos, or images from the Internet, which I do not have written permission to include. I further agree that my name typed on the line below is intended to have, and shall have the same validity as my handwritten signature.…

    • 1465 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959…

    • 4737 Words
    • 19 Pages
    Best Essays