Digital Signature is a guaranteed process of converting or
transferring message from one side to another without any interruption. Using a
private or public key pair, of the content of the message that you add a one-way
hash, is signed by you and the server digitally. The signature that only the
server’s key can decrypt that can be read by your client anytime. It works with
an efficient and a proper procedure of coding, considering the file and then make
it possible to be done properly is with the languages and codes makes it work
properly so that the client can read a signature digitally.
In order to prove that the document is accurate or not or it
is specifically a Geneon document, without any alteration. In legal matters
this thing is very much important to be considered carefully that all the
documents should be original and legal. The digital signature is actually that
saved version of the thing that has to be done legally with the perspective of
doing it electronically. Digital signature processing actually depends on the
language and the hash code that makes it runs properly. [1]
Requirements of Digital signatures
Digital
signatures are the electronic fingerprints that ensure safety and authenticity.
It acts as a coded message which ensures transaction of a message from one to
another. A standard and accepted format is used by digital signatures, which is
known as PKI. It stands for Public Key Infrastructure. PKI is widely accepted
and ensures security [2].
The
working of digital signature is unique. Every hand written signature is
different from another similarly every digital signature is different from
another. DocuSign is the provider of Digital signature and it follows a
protocol which is PKI. Mathematical algorithm is used to generate two long
numbers known as keys. One key is private while other one is for public. When a
document is signature electronically, this signature is generated by the use of
private key of signer. This key is always kept private by the signer for
security purpose [2]. Here, hash is
created when the mathematical algorithm acts like cipher and matching signature
is created. After creation of hash the data is encrypted. Time is also marked
to signify that document is signed. In case of changing the document after
signature, digital signature becomes invalid. PKI requires digital signature to
be properly created, then conduct it and save it in a proper manner. This can
sometimes require proper authentication from a reliable source such as
Certificate Authority (CA).
What digital
signatures do
Digital
signatures can help to develop the authentication features; however, the
digital signature is based on authenticity and there is integrity that helps
making sure that the content is altered or not as it was a digitally signed. Through
focus on the non-reputation:- The digital signatures help validating to all
parties, the source of the signed content. Repudiation refers to take action of
a signer denying any associate with the signed content. This helps to establish
the originator of the file the true originator and not somebody else,
separately from the state of the signer. A signer not able to repudiate the
signature on that file without repudiating his key, so other documents signed
with that key.
Why do we need a digital signature?
It
is an electronic document which is issued by CA. It is specific for every
signer and every recognized organization. CA is needed to ensure security and
confirms that the public key belongs to an organization and is safe. CA guarantees
the security of the document.
In
the research practical is conducted for the purpose of providing evidence about
the methods and used in the configurations of the certificates in the PKI
enabled applications. In the practical research Microsoft Certificate services
is also used for configurations of the digital signatures.
Advantage and disadvantage of digital signature
There
are some advantages and disadvantages of the digital signatures; as some big
advantages include that message cannot be modified through using the digital
signatures. The document or the memo cannot be encrypted, moreover, it can confirm
the individuality of the sender therefore, and other person cannot copy it. It
is analyzed that there is automatic date and period stamps on the digital
signature. Digital Signatures also has some disadvantages as it can be utilized
to produce the digital signature.
The
practical was conducted through the use of modern software and programs
commonly used for configurations of the certificates in the private key
infrastructure. Digital signatures used in the e-mails and websites are also a
private key infrastructure (PKI). Practical also covered the configuration of
the digital signature in a comprehensive way. There are several ways of
evaluating the various types of certificates however the methodology used in
the practical was the most appropriate and authentic in regards to accuracy and
reliability of the results [3]
Digital
signature has some issues related to ethics and social values. While conducting
research that legal and ethical values are taken into considerations to avoid
illegal and un-ethical actions. The data collected in the research will not be
shared without the permission of the participants. In the research only legally
allowed and valid licensed certificates are used. Digital signatures used in
the research are licensed legally by the authorities. In the whole research
social values and security related issues are also given importance. While
research is also based on the BCS terms and regulations.
For
the algorithm of digital signature can be explained as the “mathematical
concept of modular exponentiations”; it is a free algorithm that are made for
the digital signature under some hash functions. These digital signatures are
cryptographic hash and made under some algorithms MD5 and SHA1 encrypt. These
are some algorithms that are utilized to transit the data. The digital
signatures are made under protection measures known as the RSA encryption; it
is the authentication system that also has some mathematical function based on
the public and private keys:
RSA example of Digital Signatures
SSL
certifications of the digital pen are under some internet communications
protocols. RSA system could be explained as the hybrid cryptosystems; there are
some symmetric algorithms that are considered under the internet communications
protocols example, S/WAN, S/MIME and SSL are some symmetric algorithms.
PKI
technology is most demanding as it also has proper mathematical algorithm; it
is based on the encrypted data; which follows the PKI requirements for safe
digital signing. For the safety in the digital signature PKI technology is concerned;
as PKI based digital signatures are safe.
Conclusion on Digital Signatures
The
research was conducted to get the practical knowledge about the private key
configurations and the certificates of the configurations of digital
signatures. Through the research I learnt a new knowledge that increase my
previous knowledge about the private key infrastructures (PKI) and the software
used for configurations.
The
product can be improved through following these recommendations:
·
The
product should be improved through providing solutions to the problems raised
in the project while conducting the practical, as limited information about the
software was problems that need attention for removal.
Appendix of
Digital Signatures
References of Digital Signatures
[1]
|
W. Stallings,
Cryptography and Network Security: Principles and Practice, Prentice Hall,
2006.
|
[2]
|
Dartmouth.edu,
"Applications Enabled by PKI," 2018. [Online]. Available: http://www.dartmouth.edu/~deploypki/materials/modules/applications/appsmenu.htm.
[Accessed 11 11 2018].
|
[3]
|
Docusign.com,
"Understanding digital signatures," 2008. [Online]. Available:
https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq.
|
[4]
|
J. P. Davidson,
Project Management, Breathing Space Institute, 2000, p. 182.
|
[5]
|
Acrobat.adobe.com,
"What are digital signatures?," 2018. [Online]. Available:
https://acrobat.adobe.com/us/en/sign/capabilities/digital-signatures-faq.html.
|