Electronic signature _ digital signature by NovakovaOksana

VIEWS: 85 PAGES: 23

the presentation about encryption and decryption, electronic signature, digital signature, authentication, private key, public key, hashing algorithms, credit cards, online banking, smart cards.

More Info
									Electronic signature &
electronic paymant
methods
         Universität Heidelberg
         Fachübersetzen im Kontext
         europäischer Normen
         Dozent: Dr. John Stewart
         Referentin: Oksana Novakova
         WS 2009/2010
         14.12.2009
             Outline

              Encryption and decryption
              Electronic signature
              Digital signature
              Authentication
              Private key
              Public key
              Hashing algorithms
              Credit cards
              Online banking
              Smart cards

13.12.2010                                 2
             Sensitive information

              Credit-card information
              Social security numbers
              Private correspondence
              Personal details
              Sensitive company information
              Bank-account information



13.12.2010                                     3
             Encryption and Decryption

              Encryption is the method of disguising
               plaintext in such a way as to hide its
               substance

              Decryption is the process of reverting
               ciphertext in its original plaintext



13.12.2010                                              4
             Encryption and Decryption




13.12.2010                               5
             Electronic signature

              Is defined as an electronic sound,
               symbol or process attached to or
               logically associated with a record, and
               executed or adopted by a person with
               the intent to sign the record.




13.12.2010                                               6
             Digital signature

              Is a way to ensure that an electronic
               document is authentic



              Rely on certain types of encryption to
               ensure authentication



13.12.2010                                              7
             Difference?

              Electronic signature insecure way of signing
               documents
              Are vulnerable to copying and tempering,
               making forgery easy



              Digital signature is legally binding > secure
              Based on PKI (Public Key Infrastructure) and is
               the result of a cryptographic operation that
               guarantees signer authenticity
13.12.2010                                                       8
             How does it work
              You copy-and-paste the contract
              Using the special software, you obtain a message hash
               (mathematical summary) of the contract
              You then use a private key that you previously obtained
               from a public-private-key authority to encrypt the hash
              The encrypted hash becomes your digital signature of the
               message




13.12.2010                                                             9
             How does it work

             At the other end

              To make sure it is intact and from you, the recipient
                makes a hash of the received message

              The recipient then uses your public key to decrypt the
                message hash or summery

              If the hashes match, the received message is valid




13.12.2010                                                              10
             Digital signature

              http://www.arx.com/flash/Digital-
               Signatures-for-Word-2003.htm




13.12.2010                                         11
13.12.2010   12
             Authentication

             Is used to verify that the information comes
                from a trusted source
              ways of authentication:
              Password
              Digital signatures
              Private key encryption
              Public key encryption
              Hash value
              Digital certificate



13.12.2010                                              13
             Private key encryption

              Is the secret key of the computer


              Encrypts the information




13.12.2010                                         14
             Public key encryption

              The combination of a private key and a
               public key

              Decodes the encrypted message




13.12.2010                                              15
             Hashing algorithm

              Hashing is the transformation of a
               string of characters into a usually
               shorter fixed-length value or key that
               represents the original string.

              the public key encryption is based on
               a hash value


13.12.2010                                              16
              Hashing algorithm

              The value is computed from a base input
             number using a hashing algorithm


              Input number     Hashing       Hash value
                               algorithm
                 10,667      Input # x 143   1,525,381



13.12.2010                                                17
             Digital certificate

              Serves for the secure Web server


              The information that says the Web
               server is trusted by an independent
               source known as a Certificate Authority




13.12.2010                                               18
             Credit cards

              Origin USA during 1920


              Contains the identification information
               such as a signature and picture and
               authorizes the person




13.12.2010                                               19
             Smart cards

              Innovative application that involves all
               aspects of cryptography
              Has an microprocessor built into the card
               itself
              Has enhanced memory and processing
               > several different applications on a
               single card


13.12.2010                                                20
             Online banking

              Advantages
              Convenience
              Ubiquity
              Efficiency
              effectiveness




13.12.2010                     21
             Online banking

              Disadvantages
              Start-up may take time
              Learning curve
              Bank site changes
              The trust thing




13.12.2010                              22
             Sources:

              http://www.arx.com/digital-signatures-
                 faq.php#digital-signature
                http://computer.howstuffworks.com/encryption5.
                 htm
                http://money.howstuffworks.com/personal-
                 finance/debt-management/credit-card.htm
                http://computer.howstuffworks.com/encryption.h
                 tm
                http://www.arx.com/flash/Digital-Signatures-for-
                 Word-2003.htm

13.12.2010                                                     23

								
To top