Cyber Law Week 4

 Cyber Law Week 4

Digital Signature

Digital signature is an electronic signature used to verify the identity of the sender/ signer of a message and also to ensure the correctness and validity of information in electronic transactions. The use of recognized digital signature can fulfil requirements of confidentiality, identity authentication, non-repudiation, and integrity of an information.
 
The Digital Signature Act 1997 (DSA 1997) which came into force on 1st October 1998, with the purpose of regulating the use of digital signature in Malaysia, ensures the security of legal issues related to electronic transactions and verifies the use of digital signatures through certificates issued by licensed Certification Authority (CA).
 
The Malaysian Communications and Multimedia Commission (MCMC) is responsible to administer, enforce, carry out and give effect to the provisions under DSA 1997 for the purpose of monitoring and overseeing the activities of CAs.


How do digital signatures work?

Digital signatures, like handwritten signatures, are unique to each signer. Digital signature solution providers, such as DocuSign, follow a specific protocol, called PKI. PKI requires the provider to use a mathematical algorithm to generate two long numbers, called keys. One key is public, and one key is private.

When a signer electronically signs a document, the signature is created using the signer’s private key, which is always securely kept by the signer. The mathematical algorithm acts like a cipher, creating data matching the signed document, called a hash, and encrypting that data. The resulting encrypted data is the digital signature. The signature is also marked with the time that the document was signed. If the document changes after signing, the digital signature is invalidated.

As an example, Jane signs an agreement to sell a timeshare using her private key. The buyer receives the document. The buyer who receives the document also receives a copy of Jane’s public key. If the public key can’t decrypt the signature (via the cipher from which the keys were created), it means the signature isn’t Jane’s, or has been changed since it was signed. The signature is then considered invalid.

To protect the integrity of the signature, PKI requires that the keys be created, conducted, and saved in a secure manner, and often requires the services of a reliable Certificate Authority (CA). Digital signature providers, like DocuSign, meet PKI requirements for safe digital signing.






Comments

Popular posts from this blog

Cyber Law Week 11

Cyber Law Week 10

Cyber Law Week 13