<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

The technology behind digital signatures is called PKI or Public Key Infrastructure. In order to go paperless in industries that rely on securing signatures for legal documents, there has to be a secure way to protect that digital signature for the end user as well as the business.

PKI uses asymmetric key-pair encryption. The only way to decrypt data encrypted with one key in the pair is by using the other key in the pair. This key pair is comprised of a public key and a private key. The public key, may be shared freely, as this key does not need to be kept confidential. The private key, on the other hand, must be kept secret. The owner of the key pair must guard his private key closely, as sender authenticity and non-repudiation are based on the signer having sole access to his private key. A Certification Authority, who confirms and verifies the identity of an individual before issuing a certificate, certifies the key pair. This forms the 'Digital Identity' for that individual. The certificate issued is called the 'Digital Certificate'.

public key encryptionThere are a few important characteristics of these key pairs. They are mathematically related to each other, it is impossible to calculate one key from the other. Therefore, the private key cannot be compromised through knowledge of the associated public key. Second, each key in the key pair performs the inverse function of the other. What one key does, only the other can undo. The private key is used for signing and decrypting a message or a document while the public key is used to verify or encrypt.

There are 7 basic steps that are taken in this process:

  1. An Individual applies to Certification Authority for Digital Certificate.
  2. CA proofs and identifies the individual and issues Digital Certificate.
  3. CA publishes Certificate to Repository.
  4. Individual digitally signs electronic message with Private Key to ensure Sender Authenticity, Message Integrity and Non-Repudiation and sends the message.
  5. The receiving party receives message, verifies Digital Signature with the individual's Public Key, and goes to Repository to check status and validity of Individual's Certificate.
  6. Repository returns results of status check on Individual's Certificate to verifying party.
  7. Digital certificates

There is a great need for imporved cyber-security in regards to electronic signatures. Higher education is one of the areas in which digital signature technology would greatly reduce the risks of attacks, viruses, and spam that colleges and universities face on a daily basis. Not only does this protect information handled online, but it reduces paper waste.

Using PKI technology, digital signature software offers unique solutions to real problems.

With extensive deployment in the federal government and among notable industry giants, a sound foothold in higher education, and significant new developments.

download our white paper on the differences between digital signatures and electronic signatures