Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Podpis elektroniczny i jego zastosowanie w biznesie

2,787 views

Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Podpis elektroniczny i jego zastosowanie w biznesie

  1. 1. Digital signature and its use in business PODPISANI.PL
  2. 2. Agenda • Application of digital signature • Some primary theory • Polish digital signature act • Digital signature in business
  3. 3. Application Źródło: Unizeto Technologies S.A.
  4. 4. Theory • Confidentiality – data security against unauthorized access • Integrity – data security against changes • Authenticity – proof of the origin
  5. 5. Digital signature Digital signature = • Keys • Public • Private • Certificate
  6. 6. Digital signature –keys • Private key = 1276419276529216412731064912412784162 45120341y6298341602452893461093712423 5416543128548320573404712835610823059 8394612563489673931269482365026432187 9542386412892351925423056342096123851 3287412874532985634056340956238541287 4192452305673409641283521874314523056 1280371209387102937102937126412531892 6412564198634129541293198215735128321
  7. 7. Private key = public key-1?
  8. 8. Operation with keys
  9. 9. Private key belongs to me. It’s mine! My precious! Public key belongs to me, but everyone has access to it
  10. 10. Questions?
  11. 11. Something about… confidentiality Give me your bank account number and I will send you 100 000$
  12. 12. Something about… Authenticity Ola has a cat WTF?!
  13. 13. Trusted Third Party TTP
  14. 14. Trusted Third Party – getting keys Registration certification center place TTP Document transfer Proposal, Repository agreement Źródło:
  15. 15. Why trust? ?
  16. 16. Certificate You can use it to: •Sign your e-mail •Computer access •Secure your software •Make proof of your identity
  17. 17. What the signature are?
  18. 18. We sign a message? No. We sign a hash. Calculation of a sign from a very large message is time-consuming. So…
  19. 19. Summary Źródło: wikipedia.org

×