<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

The technology behind digital signatures is called PKI or Public Key Infrastructure. In order to go paperless in industries that rely on securing signatures for legal documents, there has to be a secure way to protect that digital signature for the end user as well as the business.

PKI uses asymmetric key-pair encryption. The only way to decrypt data encrypted with one key in the pair is by using the other key in the pair. This key pair is comprised of a public key and a private key. The public key, may be shared freely, as this key does not need to be kept confidential. The private key, on the other hand, must be kept secret. The owner of the key pair must guard his private key closely, as sender authenticity and non-repudiation are based on the signer having sole access to his private key. A Certification Authority, who confirms and verifies the identity of an individual before issuing a certificate, certifies the key pair. This forms the 'Digital Identity' for that individual. The certificate issued is called the 'Digital Certificate'.

public key encryptionThere are a few important characteristics of these key pairs. They are mathematically related to each other, it is impossible to calculate one key from the other. Therefore, the private key cannot be compromised through knowledge of the associated public key. Second, each key in the key pair performs the inverse function of the other. What one key does, only the other can undo. The private key is used for signing and decrypting a message or a document while the public key is used to verify or encrypt.

There are 7 basic steps that are taken in this process:

  1. An Individual applies to Certification Authority for Digital Certificate.
  2. CA proofs and identifies the individual and issues Digital Certificate.
  3. CA publishes Certificate to Repository.
  4. Individual digitally signs electronic message with Private Key to ensure Sender Authenticity, Message Integrity and Non-Repudiation and sends the message.
  5. The receiving party receives message, verifies Digital Signature with the individual's Public Key, and goes to Repository to check status and validity of Individual's Certificate.
  6. Repository returns results of status check on Individual's Certificate to verifying party.
  7. Digital certificates

There is a great need for imporved cyber-security in regards to electronic signatures. Higher education is one of the areas in which digital signature technology would greatly reduce the risks of attacks, viruses, and spam that colleges and universities face on a daily basis. Not only does this protect information handled online, but it reduces paper waste.

Using PKI technology, digital signature software offers unique solutions to real problems.

With extensive deployment in the federal government and among notable industry giants, a sound foothold in higher education, and significant new developments.

download our white paper on the differences between digital signatures and electronic signatures

 

You may also like

The Future of the National Credit Union Brand
The Future of the National Credit Union Brand
9 April, 2014

Credit unions have talked about developing a national brand for many years. The idea: to effectively compete against lar...

Atlanta Postal Credit Union Picks SIGNiX for Security, Value
Atlanta Postal Credit Union Picks SIGNiX for Security, Value
24 March, 2014

After comparing e-signature vendors, Georgia’s second largest credit union choses SIGNiX for higher security at a lower ...

SIGNing on with Real Estate: SIGNiX at the NAR Midyear Expo
SIGNing on with Real Estate: SIGNiX at the NAR Midyear Expo
22 May, 2012

Last week, we exhibited at the National Association of REALTORS® (NAR) Midyear trade show and conference in Washington, ...