1 / 31

Klara Góral Karolina Kozak Ignacio Lastres

Klara Góral Karolina Kozak Ignacio Lastres. Electronic signature. Agenda: 1. Introduction 2. General overlook 3. L egal   statements 4 . History 5 . Construction 6 . Use of electronic signature 7 . Future. General overlook. Signature. S tylized script associated with a person.

craig
Download Presentation

Klara Góral Karolina Kozak Ignacio Lastres

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Klara GóralKarolina KozakIgnacio Lastres Electronic signature

  2. Agenda:1. Introduction2. General overlook3. Legal  statements4. History5. Construction6. Use of electronic signature7. Future

  3. General overlook

  4. Signature Stylized script associated with a person

  5. Electronic signature An electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record

  6. electronic signaturevs. digitalsignature

  7. Legal statements

  8. Lawsregardinguse of electronic signatures Slovakia - Zákon č.215/2002 o elektronickompodpise Singapore - Singapore Electronic TransactionsAct Republika Srpska European Union - Electronic SignatureDirective Canada - PIPEDA UK - s.7 Electronic Communications Act 2000 Poland - Ustawa o podpisie elektronicznym SouthAfrica - The Electronic Communications and TransactionsAct U.S. - Digital Signature And Electronic Authentication Law Japan - Law Concerning Electronic Signatures and Certification Services CostaRica - Digital Signature Law Canada - PIPEDA China - Law of thePeople’s Republic of China on Electronic Signature Croatia Peru - Ley Nº 27269. Ley de Firmas y CertificadosDigitales Czechia – Zákon o elektronickém podpisu SloveniaSlovene Electronic Commerce and Electronic SignatureAct Philippines - Electronic Commerce Act Spain - Real Decreto-ley 14/1999, sobre firma electrónica India - Information Technology Act Turkey - Electronic Signature Law Mexico - E-Commerce Act

  9. Lawsregardinguse of electronic signatures Slovakia - Zákon č.215/2002 o elektronickompodpise Singapore - Singapore Electronic TransactionsAct Republika Srpska European Union - Electronic SignatureDirective Canada - PIPEDA UK - s.7 Electronic Communications Act 2000 Poland - Ustawa o podpisie elektronicznym SouthAfrica - The Electronic Communications and TransactionsAct U.S. - Digital Signature And Electronic Authentication Law Japan - Law Concerning Electronic Signatures and Certification Services CostaRica - Digital Signature Law Canada - PIPEDA China - Law of thePeople’s Republic of China on Electronic Signature Croatia Peru - Ley Nº 27269. Ley de Firmas y CertificadosDigitales Czechia – Zákon o elektronickém podpisu SloveniaSlovene Electronic Commerce and Electronic SignatureAct Philippines - Electronic Commerce Act Spain - Real Decreto-ley 14/1999, sobre firma electrónica India - Information Technology Act Turkey - Electronic Signature Law Mexico - E-Commerce Act

  10. The Electronic Signatures in Global and National Commerce Act (ESIGN) • Validity and legal effectof contracts entered into electronically • legal status equivalent to a written signature • may not be denied legal effect, validity, or enforceability solely because it is in electronic form

  11. Legal requirements of electronic signatures: • must be unique to the person using it • must be verifiable • must be under the sole control of the person using it • must guarantee that the document signed cannot be altered after it has been electronically signed • must capture and preserve the signer's intent, consent, understanding, or responsibility related to a document that is being signed

  12. History

  13. History of electronic signatures • Before 1861 – morse code used to send messages electronically by telegraphy • 1869 - acceptance of the enforceability of telegraphic messages as electronic signatures in New Hampshire Supreme Court • 1980s – use of fax • 1990s - Acceptance of the enforceability of agreements made by e-mail, entering PIN into a bank ATM, signing a debit or credit slip withdigital pen pad device, installing software with a clickwrap software licence on thepackage, signing electronic documentsonline

  14. History of electronic signatures Joint Communicué on electronic commerce first agreementsignedelectronically by USA and Ireland in 1998

  15. Construction How it works?

  16. Cryptography The basis of electronic signatures is cryptography, mathematical discipline that not only handles the encryption of texts to ensure their confidentiality and provides mechanisms to ensure data integrity and identity of participants in a transaction.

  17. Cryptography Encryption involves transforming a plain text (understood by all) by an algorithm in a cipher text, thanks to a secret or encryption key, which is unintelligible to all except the legitimate recipient.  HASH function

  18. Hash function To obtain a hash (also called a message digest) of a text  fairly short series of characters representing the text to which you apply this hash function  the fingerprint of a document.

  19. Hash function •  Must only associate a hash with a plain text  the slightest alteration of the document will cause a change in the hash.  • It must be a one-way function for the original message can not be retrieved from the hash. •  If there is a way of finding the plaintext  from the hash, it seems that the hash function has a "trapdoor. "

  20.  Hash algorithms • MD5 (Message Digest)  - developed by Rivest in 1991 - creates (from a text whose size is chosen at random) a 128-bit fingerprint processing it into blocks of 512 bits. - it is common to see Internet downloads  that are accompanied by MD5 files  to verify its integrity.

  21. Hash algorithms • SHA (Secure Hash Algorithm) - creates a digital fingerprint that is 160 bits of length. - SHA-1 is an improved version from 1994 produces a fingerprint of 160 bits from  a message that has a maximum length of 264 bits and processed in blocks of 512 bits.

  22. Integrity verification • when sending a message along with its hash  the recipient can be sure that the message has not been altered(intentionally or accidentally). • when a recipient receives a message simply has to calculate the hash of the received message and comparing it with the hash that accompanies the document.  if  the message(or hash) is falsified during the communication, the two digital fingerprints will not coincide.

  23. Sealing data • to ensure that the message has been sent by the person claiming to be the sender. • the sender simply encrypts (signs) the hash using its private key (seal) and send the seal to the recipient • the recipient must decrypt the seal with the sender's public key • then the recipient must compare the  received hash with the hash function of the hash received as attachment.

  24. Methods of encryption • Asymmetric encryption or public key - when using a pair of separate keys for encryption and decryption processes.  - one key, the private is kept secret, while the second key, the public, is known by everyone. -using RSA algorithms, Diffie-Hellman, etc.

  25. Example • 1. John produces a summary of the document. • 2. John encrypts the abstract with his private key, thereby signing the document.  This summary is your electronic signature.  • 3.John sends the document along with the summary  signed (electronic signature) to Peter. • 4. Peter produces a summary of the document received from John, using the same function summary way.  • 5. Peter then decrypted with the public key of John, which is known, the summary signed (electronic signature of John).  • 6. If the digest matches the digest signed Peter  has generated the electronic signature is valid.

  26. Methods of encryption • Symmetric key encryption or secret - when using the same key in encryption and decryption operations.  - these systems are much faster than public key, and appropriate for the encryption of large volumes of data. - this is done using algorithms such as IDEA, RC5, DES, Triple DES, etc..

  27. Use of electronic signature

  28. Use of electronic signatures • e-government and on-line banking • signing electronic contracts and other documents • authorizing online forms and service orders • provide advantage over non-user competition

  29. Future

  30. Electronic signatures in Poland • ID card with chip

More Related