Digital Signature Essay

Digital signatures are comprised of a series of algorithms and mathematical constructs that ensure the authenticity and verifiability of a person signing a specific document. The reliance on digital signatures continues to increase as virtual work teams, the development of automated contract management, compliance, financial reporting and advanced workflows in the fields of financial services continues to grow (Keenan, 2005). The intent of this analysis is to define the properties and usage of digital signatures, evaluate how legal digital signatures are to stand up in court, and explain the security challenges of digital signatures as well. Properties and Usage of Digital Signatures

The foundational technology elements of digital signatures are predicated on mathematical algorithms used for supporting advanced asymmetric cryptography including the option of repudiation and non-repudiation (Borasky, 1999). These two areas of repudiation and non-repudiation are essential for ensuring the authenticity and veracity of the person(s) signing are in fact who they say they are (Levin, 2007). Additional properties of digital signatures include private key and cryptographic verification using protocols specifically designed for this purpose (Keenan, 2005). The cryptographic algorithms used must be compatible with the key generation, signing and signature verifying algorithms to ensure digital signatures perform as a common foundation for document security and validation. The area of key generation is one that has seen the greatest number of patents as many enterprise software, messaging and platform providers all look to create a proprietary advantage in their software using this technique (Levin,...

...

Attaching digital signatures and ensuring their accuracy using key generation and key cryptography techniques relies on a specific series of algorithm responses form the send to also ensure verification and authentication of transactions (Keenan, 2005). A unique key must be created for each transaction using an encrypted algorithm that exactly matches up to the specific keys, creating a verif8ied connection, opening the document up for signature (Borasky, 1999).
State-of-the-art digital signature systems have very advanced authentication systems that include e-mail authentication, access code authentication that checks a person's ability to provide a share secret or passphrase, identification check using advanced authentication techniques, support for federated authentication that supports algorithms for other authentication platforms and two-factor biometric authentication as well (Levin, 2007). These features taken together allow for shared contract management, compliance and financial reporting workflows across a diverse base of organizations.

Digital Signatures' Legal Ability To Stand Up In Court

There continues to be much debate regarding the legality of digital signatures throughout the accounting, finance and compliance-driven industries that are increasingly relying on them for cost and time savings. The need to produce digitally-based contracts, agreements and reporting to better streamline communication and enable greater levels…

Sources Used in Documents:

Bibliography

Borasky, D.V. (1999). Digital signatures: Secure transactions or standards mess? Online, 23(4), 47-50.

Keenan, C. (2005). Digital signatures: Worth the paper they're written on? Community

Banker, 14(11), 20.

Levin, R. (2007). Digital signatures - coming soon to a document near you. AIIM E - Doc Magazine, 21(6), 24-25.


Cite this Document:

"Digital Signature" (2013, November 09) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/digital-signature-126659

"Digital Signature" 09 November 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/digital-signature-126659>

"Digital Signature", 09 November 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/digital-signature-126659

Related Documents

Digital Signature Scheme Based on Factorization The objective of this study is to discuss an issue in cryptography or computer security. Digital signatures are described as "an analog of handwritten signatures" which are based on "the physically idiosyncratic way of signing one's name. But they can be easily forged." (Grabbe, 1998) The digital signature is "a mathematical method of attaching one's identity to a message" and is held to be more

(SEAL, Sec 3(g)) The following section tells us when electronic authentication may be used: a) ELECTRONIC AUTHENTICATION OF DOCUMENTS, INFORMATION, AND IDENTITY- (1) IN GENERAL- A financial institution may use electronic authentication in the conduct of its business if it has entered into an agreement regarding the use of electronic authentication with any counterparty, or if it has established a banking, financial, or transactional system using electronic authentication. (SEAL, Section 6f) The Bill

electronic signatures as is used for the purposes of e-commerce. The writer explores their use, their problems and some of the legislature for their use. The primary focus is on the differences and similarities in three states regarding electronic signatures. There were three sources used to complete this paper. With the advent of the internet came the ability to sign for things electronically. Electronic signatures have become a topic of

These protocols allow client/server applications to communicate in a way designed to prevent eavesdropping, tampering and message forgery. IPsec is a standard that provides security at the network layer by encrypting and/or authenticating IP packets. Watermarking, Fingerprinting and Access control are other important DRM techniques. Watermarking is the process of embedding information into a data source in such a way its existence is hidden. It essentially serves as a copyright

Hash Values in Digital Forensics Introduction Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables

Signature 410-Non-Profit Healthcare Organization-A Comprehensive Study Introduction Catholic Health Initiatives (CHI) is a non-profit organization that consists of four separate national Catholic health systems that were combined under CHI over the past three decades. CHI offers assisted living services, nursing home services, memory care, rehabilitation care, hospital care, adult day care services, and many other health care services around the nation. It has recently merged with Dignity Health becoming one of the