Digital signature and
  its use in business
         PODPISANI.PL
Agenda

•   Application of digital signature
•   Some primary theory
•   Polish digital signature act
•   Digital signatur...
Application




              Źródło: Unizeto Technologies S.A.
Theory
• Confidentiality – data security
  against unauthorized access
• Integrity – data security against
  changes
• Aut...
Digital signature

Digital signature =
• Keys
   • Public
   • Private
• Certificate
Digital signature –keys
• Private key =
  1276419276529216412731064912412784162
  45120341y6298341602452893461093712423
  ...
Private key = public key-1?
Operation with keys
Private key belongs to me.
It’s mine! My precious!
Public key belongs to me,
but everyone has access to
it
Questions?
Something about… confidentiality

Give me your bank account number
   and I will send you 100 000$
Something about… Authenticity

                      Ola has a cat

                  WTF?!
Trusted Third Party
      TTP
Trusted Third Party – getting keys
   Registration               certification center
     place                          ...
Why trust?



             ?
Certificate




              You can use it to:
              •Sign your e-mail
              •Computer access
          ...
What the signature are?
We sign a message? No. We sign a
hash.

Calculation of a sign from a very large message is time-consuming.

So…
Summary




          Źródło: wikipedia.org
Podpis elektroniczny i jego zastosowanie w biznesie
Upcoming SlideShare
Loading in …5
×

Podpis elektroniczny i jego zastosowanie w biznesie

2,629
-1

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,629
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Podpis elektroniczny i jego zastosowanie w biznesie

  1. 1. Digital signature and its use in business PODPISANI.PL
  2. 2. Agenda • Application of digital signature • Some primary theory • Polish digital signature act • Digital signature in business
  3. 3. Application Źródło: Unizeto Technologies S.A.
  4. 4. Theory • Confidentiality – data security against unauthorized access • Integrity – data security against changes • Authenticity – proof of the origin
  5. 5. Digital signature Digital signature = • Keys • Public • Private • Certificate
  6. 6. Digital signature –keys • Private key = 1276419276529216412731064912412784162 45120341y6298341602452893461093712423 5416543128548320573404712835610823059 8394612563489673931269482365026432187 9542386412892351925423056342096123851 3287412874532985634056340956238541287 4192452305673409641283521874314523056 1280371209387102937102937126412531892 6412564198634129541293198215735128321
  7. 7. Private key = public key-1?
  8. 8. Operation with keys
  9. 9. Private key belongs to me. It’s mine! My precious! Public key belongs to me, but everyone has access to it
  10. 10. Questions?
  11. 11. Something about… confidentiality Give me your bank account number and I will send you 100 000$
  12. 12. Something about… Authenticity Ola has a cat WTF?!
  13. 13. Trusted Third Party TTP
  14. 14. Trusted Third Party – getting keys Registration certification center place TTP Document transfer Proposal, Repository agreement Źródło:
  15. 15. Why trust? ?
  16. 16. Certificate You can use it to: •Sign your e-mail •Computer access •Secure your software •Make proof of your identity
  17. 17. What the signature are?
  18. 18. We sign a message? No. We sign a hash. Calculation of a sign from a very large message is time-consuming. So…
  19. 19. Summary Źródło: wikipedia.org

×