SlideShare a Scribd company logo
Page 1




User-Friendly Digital Signatures
           Jon Matonis, CEO, Hush Communications




             Digital Identity Forum
                 October 17 & 18th 2000
                    Marlborough Hotel
                       London, UK



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                          Page 2




                    Overview

• Digital Signatures & the Market
• What are Digital Signatures ?
• Signatures v. Certificates
• Complex PKI Deployments
• The Hush Communications Solution: Technology
• The Hush Communications Solution: Trust
• Contact Hush



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    1
Page 3




 Digital Signatures & the Market

    • Until recently, digital signatures were not
      considered legally binding within the United
      States;
    • Europe has been quicker to adopt digital
      signatures as a replacement for the traditional
      written signature;
    • Touted as the link between consumers and e-
       commerce, digital signatures are an emerging
       technology poised to generate significantly larger
       transaction sizes.
                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                        Page 4




       What are Digital Signatures ?

• Digital signatures verify with mathematical
  certainty that the message, document, or
  other media received originated from the
  anticipated sender (authentication);
• Digital signatures ensure that what you send
  over the Internet is exactly what is received at
  the other end (integrity);

                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                                  2
Page 5




       What are Digital Signatures ?

• Digital signatures ensure that someone
  cannot deny that they authorized a particular
  transaction (non-repudiation);
• There are multiple ways to create digital
  signatures, including biometrics, like face
  printing and retina scans, but the most
  common methods involve cryptographic
  algorithms and protocols.
                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                   Page 6




          Signatures v. Certificates

• A digital signature is created by encrypting
  data with a private key.
• A digital certificate is a public key that is
  digitally signed by a Certificate Authority (CA).




                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                             3
Page 7




         Complex PKI Deployments

• Issuing a digital certificate can cost anywhere
  from $5 to $10 per customer.
• The enterprise software needed to manage the
  key, which decrypts and encrypts a message, can
  cost as much as $10 to $100 a person.
• Consumers must pay a periodic fee for the use of
  a digital certificate.
• Most signing devices are linked to a particular PC
  or network.
                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                     Page 8




         Complex PKI Deployments

• The private portion of the digital identity must
  be accessible exclusively to the owner and
  must be used to decrypt and sign data.
• Most PKI solutions require that the user
  possess their private key, which is inherently
  unsafe and reliant upon properly configured
  hardware.

                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                               4
Page 9




         Complex PKI Deployments

• PKI-based digital certificates are inefficient
  and cumbersome where a certificate is
  required to authenticate an individual user.
• Traditional PKI doesn’t have roaming
  capability.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 10




   The Hush Communications Solution

  The Hush Encryption Engine ™ allows end-
  users to store their private key on a Hush
  server. The user doesn’t have to carry a
  private key, smart card, or store the key on a
  hard drive. However, even though Hush
  manages the private key, it is always
  encrypted and is inaccessible to anyone at
  Hush or elsewhere.
                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              5
Page 11




   The Hush Communications Solution

• The Hush Encryption Engine ™ ensures that
  no one but you can access your private key.
• The Engine doesn’t tie you to a single
  computer.
• The Engine is compatible with multiple online
  applications.
• The Engine works with the Java ™
  technology in most common Web browsers.                       October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 12




               Hush Technology

• Hush users generate their private key on their own
  computer first, during signup of installation, and
  encrypt it with a passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 6
Page 13




                Hush Technology

• And then, upload the encrypted private key to one of
  the Hush servers.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 14




                Hush Technology

• After that, whenever a user starts a secure
  communications session, the private key
  automatically is retrieved from the server.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 7
Page 15




                Hush Technology

• And finally, decrypted with the user’s passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 16




      IMPORTANT SECURITY NOTE

• When the private key resides on a Hush key
  server, it is encrypted with a passphrase.
  That passphrase NEVER leaves the user’s
  computer. At no point is the private key or any
  private data accessible to anyone at Hush.
  Even if Hush were to be subpoenaed, we
  would not be able to learn or reveal your
  private key.
                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 8
Page 17




           Hush Digital Signatures

• Hush offers its users the option to digitally
  sign their email and attachments.
• Hush’s digital signature feature is a method
  for the individual user to authenticate their
  online identity.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 18




                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              9
Page 19




                     October 23, 00
Copyright 2000 Hush Communications




                           Page 20




                     October 23, 00
Copyright 2000 Hush Communications




                                      10
Page 21




   Sending a Digitally Signed Message

• First, the data is signed with the user’s private key,
  which the user retrieved at the start of the session,
  when the user logs in with their passphrase.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 22




       Signed Message is Transmitted

• Then, the signed data is sent on to its final
  destination.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    11
Page 23




   Verifying a Digitally Signed Message

• First, the signed data arrives at the recipient’s
  computer.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 24




   Verifying a Digitally Signed Message

• Then, the sender’s public key is automatically
  retrieved from a Hush key server.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    12
Page 25




   Verifying a Digitally Signed Message

• Finally, the public key is used to verify the
  authenticity and integrity of the data.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 26




    The Hush Communications Solution

• Hush offers Private Label services as a way
  for leading companies to brand their secure
  messaging.
• Trusted Private Label partners control the
  registration and revocation process.
• Digital signatures are enforced and backed
  up by the policies of the Private Label
  partner.                                                         October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    13
Page 27




 Contact Hush Communications

Worldwide                Sales & Business
Headquarters             Development Office
Hush Communications      Hush Communications
22 Upper Pembroke St.    2825 E. Cottonwood
Dublin 2, Ireland        Parkway, Ste. 500
Phone +353-1-241-0303    Salt Lake City, UT 84121
Fax    +353-1-241-0370   Phone +801-990-3490
alliances@hushmail.com   Fax   +801-990-3111
                         sales@hushmail.com


                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              14

More Related Content

What's hot

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud Computing
Online Tech
 
Cyber
CyberCyber
Presentazione
PresentazionePresentazione
Presentazione
databeatpick
 
It act
It actIt act
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Sonu Mishra
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
Aniket Singh
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Robin Kapoor
 
Moldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamahMoldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamah
moldovaictsummit
 
Digital Cash Overview
Digital Cash OverviewDigital Cash Overview
Digital Cash Overview
Osama M. Khaled
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
USAID CEED II Project Moldova
 
CubeIQ | SID banknotes deposit
CubeIQ | SID banknotes depositCubeIQ | SID banknotes deposit
CubeIQ | SID banknotes deposit
Andreas Papadedes
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Dr. Prashant Vats
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
Vincent Lebunetel
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
Ugokwe Marcellus Ifeanyi
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
Future Agenda
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
Joaquim Pedro Antunes
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
Mahmoud Ezzat
 

What's hot (19)

Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud Computing
 
Cyber
CyberCyber
Cyber
 
Presentazione
PresentazionePresentazione
Presentazione
 
It act
It actIt act
It act
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Moldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamahMoldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamah
 
Digital Cash Overview
Digital Cash OverviewDigital Cash Overview
Digital Cash Overview
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
CubeIQ | SID banknotes deposit
CubeIQ | SID banknotes depositCubeIQ | SID banknotes deposit
CubeIQ | SID banknotes deposit
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 

Similar to User-Friendly Digital Signatures

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
Aditya Nama
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
Vikesh Bawane
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
K-Team Consulting Srl
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
DocuSign
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
PT Datacomm Diangraha
 
De mystifying pki
De mystifying pkiDe mystifying pki
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
 
Cryptointro
CryptointroCryptointro
Cryptointro
losalamos
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
 
Ppt
PptPpt
Online bankingsecurity
Online bankingsecurityOnline bankingsecurity
Online bankingsecurity
Mohammad Akteruzzaman(Nannu)
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Signer.Digital
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
kate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
pjpallen
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
Digital signature
Digital signatureDigital signature
Digital signature
Mohanasundaram Nattudurai
 

Similar to User-Friendly Digital Signatures (20)

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
De mystifying pki
De mystifying pkiDe mystifying pki
De mystifying pki
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Ppt
PptPpt
Ppt
 
Online bankingsecurity
Online bankingsecurityOnline bankingsecurity
Online bankingsecurity
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Digital signature
Digital signatureDigital signature
Digital signature
 

More from Jon Matonis

eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015
Jon Matonis
 
Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015
Jon Matonis
 
Family Office Forum Zurich 2014
Family Office Forum Zurich 2014Family Office Forum Zurich 2014
Family Office Forum Zurich 2014
Jon Matonis
 
Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015
Jon Matonis
 
EuroFinance Miami 2015
EuroFinance Miami 2015EuroFinance Miami 2015
EuroFinance Miami 2015
Jon Matonis
 
EuroFinance Singapore 2015
EuroFinance Singapore 2015EuroFinance Singapore 2015
EuroFinance Singapore 2015
Jon Matonis
 
EuroFinance Budapest 2014
EuroFinance Budapest 2014EuroFinance Budapest 2014
EuroFinance Budapest 2014
Jon Matonis
 
Amplify 2015
Amplify 2015Amplify 2015
Amplify 2015
Jon Matonis
 
State of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in GamblingState of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in Gambling
Jon Matonis
 
BAFT
BAFTBAFT
Login 2014 Vilnius
Login 2014 VilniusLogin 2014 Vilnius
Login 2014 Vilnius
Jon Matonis
 
The Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical CurrencyThe Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical Currency
Jon Matonis
 
Bitcoin in the iGaming Environment
Bitcoin in the iGaming EnvironmentBitcoin in the iGaming Environment
Bitcoin in the iGaming Environment
Jon Matonis
 
Bitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming DigitalBitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming Digital
Jon Matonis
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)
Jon Matonis
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
Jon Matonis
 
MileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's CurrencyMileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's Currency
Jon Matonis
 
PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5
Jon Matonis
 
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
Jon Matonis
 
The Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary UnitThe Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary Unit
Jon Matonis
 

More from Jon Matonis (20)

eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015
 
Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015
 
Family Office Forum Zurich 2014
Family Office Forum Zurich 2014Family Office Forum Zurich 2014
Family Office Forum Zurich 2014
 
Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015
 
EuroFinance Miami 2015
EuroFinance Miami 2015EuroFinance Miami 2015
EuroFinance Miami 2015
 
EuroFinance Singapore 2015
EuroFinance Singapore 2015EuroFinance Singapore 2015
EuroFinance Singapore 2015
 
EuroFinance Budapest 2014
EuroFinance Budapest 2014EuroFinance Budapest 2014
EuroFinance Budapest 2014
 
Amplify 2015
Amplify 2015Amplify 2015
Amplify 2015
 
State of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in GamblingState of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in Gambling
 
BAFT
BAFTBAFT
BAFT
 
Login 2014 Vilnius
Login 2014 VilniusLogin 2014 Vilnius
Login 2014 Vilnius
 
The Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical CurrencyThe Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical Currency
 
Bitcoin in the iGaming Environment
Bitcoin in the iGaming EnvironmentBitcoin in the iGaming Environment
Bitcoin in the iGaming Environment
 
Bitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming DigitalBitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming Digital
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
 
MileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's CurrencyMileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's Currency
 
PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5
 
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
 
The Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary UnitThe Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary Unit
 

Recently uploaded

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

User-Friendly Digital Signatures

  • 1. Page 1 User-Friendly Digital Signatures Jon Matonis, CEO, Hush Communications Digital Identity Forum October 17 & 18th 2000 Marlborough Hotel London, UK October 23, 00 Copyright 2000 Hush Communications Page 2 Overview • Digital Signatures & the Market • What are Digital Signatures ? • Signatures v. Certificates • Complex PKI Deployments • The Hush Communications Solution: Technology • The Hush Communications Solution: Trust • Contact Hush October 23, 00 Copyright 2000 Hush Communications 1
  • 2. Page 3 Digital Signatures & the Market • Until recently, digital signatures were not considered legally binding within the United States; • Europe has been quicker to adopt digital signatures as a replacement for the traditional written signature; • Touted as the link between consumers and e- commerce, digital signatures are an emerging technology poised to generate significantly larger transaction sizes. October 23, 00 Copyright 2000 Hush Communications Page 4 What are Digital Signatures ? • Digital signatures verify with mathematical certainty that the message, document, or other media received originated from the anticipated sender (authentication); • Digital signatures ensure that what you send over the Internet is exactly what is received at the other end (integrity); October 23, 00 Copyright 2000 Hush Communications 2
  • 3. Page 5 What are Digital Signatures ? • Digital signatures ensure that someone cannot deny that they authorized a particular transaction (non-repudiation); • There are multiple ways to create digital signatures, including biometrics, like face printing and retina scans, but the most common methods involve cryptographic algorithms and protocols. October 23, 00 Copyright 2000 Hush Communications Page 6 Signatures v. Certificates • A digital signature is created by encrypting data with a private key. • A digital certificate is a public key that is digitally signed by a Certificate Authority (CA). October 23, 00 Copyright 2000 Hush Communications 3
  • 4. Page 7 Complex PKI Deployments • Issuing a digital certificate can cost anywhere from $5 to $10 per customer. • The enterprise software needed to manage the key, which decrypts and encrypts a message, can cost as much as $10 to $100 a person. • Consumers must pay a periodic fee for the use of a digital certificate. • Most signing devices are linked to a particular PC or network. October 23, 00 Copyright 2000 Hush Communications Page 8 Complex PKI Deployments • The private portion of the digital identity must be accessible exclusively to the owner and must be used to decrypt and sign data. • Most PKI solutions require that the user possess their private key, which is inherently unsafe and reliant upon properly configured hardware. October 23, 00 Copyright 2000 Hush Communications 4
  • 5. Page 9 Complex PKI Deployments • PKI-based digital certificates are inefficient and cumbersome where a certificate is required to authenticate an individual user. • Traditional PKI doesn’t have roaming capability. October 23, 00 Copyright 2000 Hush Communications Page 10 The Hush Communications Solution The Hush Encryption Engine ™ allows end- users to store their private key on a Hush server. The user doesn’t have to carry a private key, smart card, or store the key on a hard drive. However, even though Hush manages the private key, it is always encrypted and is inaccessible to anyone at Hush or elsewhere. October 23, 00 Copyright 2000 Hush Communications 5
  • 6. Page 11 The Hush Communications Solution • The Hush Encryption Engine ™ ensures that no one but you can access your private key. • The Engine doesn’t tie you to a single computer. • The Engine is compatible with multiple online applications. • The Engine works with the Java ™ technology in most common Web browsers. October 23, 00 Copyright 2000 Hush Communications Page 12 Hush Technology • Hush users generate their private key on their own computer first, during signup of installation, and encrypt it with a passphrase. October 23, 00 Copyright 2000 Hush Communications 6
  • 7. Page 13 Hush Technology • And then, upload the encrypted private key to one of the Hush servers. October 23, 00 Copyright 2000 Hush Communications Page 14 Hush Technology • After that, whenever a user starts a secure communications session, the private key automatically is retrieved from the server. October 23, 00 Copyright 2000 Hush Communications 7
  • 8. Page 15 Hush Technology • And finally, decrypted with the user’s passphrase. October 23, 00 Copyright 2000 Hush Communications Page 16 IMPORTANT SECURITY NOTE • When the private key resides on a Hush key server, it is encrypted with a passphrase. That passphrase NEVER leaves the user’s computer. At no point is the private key or any private data accessible to anyone at Hush. Even if Hush were to be subpoenaed, we would not be able to learn or reveal your private key. October 23, 00 Copyright 2000 Hush Communications 8
  • 9. Page 17 Hush Digital Signatures • Hush offers its users the option to digitally sign their email and attachments. • Hush’s digital signature feature is a method for the individual user to authenticate their online identity. October 23, 00 Copyright 2000 Hush Communications Page 18 October 23, 00 Copyright 2000 Hush Communications 9
  • 10. Page 19 October 23, 00 Copyright 2000 Hush Communications Page 20 October 23, 00 Copyright 2000 Hush Communications 10
  • 11. Page 21 Sending a Digitally Signed Message • First, the data is signed with the user’s private key, which the user retrieved at the start of the session, when the user logs in with their passphrase. October 23, 00 Copyright 2000 Hush Communications Page 22 Signed Message is Transmitted • Then, the signed data is sent on to its final destination. October 23, 00 Copyright 2000 Hush Communications 11
  • 12. Page 23 Verifying a Digitally Signed Message • First, the signed data arrives at the recipient’s computer. October 23, 00 Copyright 2000 Hush Communications Page 24 Verifying a Digitally Signed Message • Then, the sender’s public key is automatically retrieved from a Hush key server. October 23, 00 Copyright 2000 Hush Communications 12
  • 13. Page 25 Verifying a Digitally Signed Message • Finally, the public key is used to verify the authenticity and integrity of the data. October 23, 00 Copyright 2000 Hush Communications Page 26 The Hush Communications Solution • Hush offers Private Label services as a way for leading companies to brand their secure messaging. • Trusted Private Label partners control the registration and revocation process. • Digital signatures are enforced and backed up by the policies of the Private Label partner. October 23, 00 Copyright 2000 Hush Communications 13
  • 14. Page 27 Contact Hush Communications Worldwide Sales & Business Headquarters Development Office Hush Communications Hush Communications 22 Upper Pembroke St. 2825 E. Cottonwood Dublin 2, Ireland Parkway, Ste. 500 Phone +353-1-241-0303 Salt Lake City, UT 84121 Fax +353-1-241-0370 Phone +801-990-3490 alliances@hushmail.com Fax +801-990-3111 sales@hushmail.com October 23, 00 Copyright 2000 Hush Communications 14