Question

In: Computer Science

How has the protocol behind Digital Signatures changed in the last 20 years? Briefly discuss the...

How has the protocol behind Digital Signatures changed in the last 20 years? Briefly discuss the history and background of this issue, and the current and future impact on the Network Security and Cryptography field.

Solutions

Expert Solution

Evolution of the protocol behind the Digital Signature in last 20 years.

In 1999 : The ability to implant digital signature into documents is added to PDF format.

In 2000: The ESIGN Act makes the digital signature legally binding. The Electronic Signatures in Global and National Commerce Act (ESIGN) allows the use of electronic records and electronic signatures to ensure the validity and legality of electronic contracts.

In 2002: The most widely used cloud-based digital signature software SIGNiX is founded.

In 2008: The PDF file format becomes an open standard to the International Organization for Standardization (ISO) as ISO 32000.

Background of digital signature:

A digital signature is a mathematical technique used to validate the authenticity of a message. A digital signature contains evidence of origin, identity and status of an electronic document.

A digital signature scheme typically consists of 3 algorithms;

  • A algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.
  • A signing algorithm that, given a message and a private key, produces a signature.
  • A signature verifying algorithm that, given the message, public key and signature, either accepts or rejects the message's claim to authenticity.

Current and future impact on the Network Security and Cryptography field:

  • Authentication

It is used to authenticate the source of the user.

  • Integrity

It is used to validate that the message is not altered during transmission as any change in message invalidates the signature.

  • Non-repudiation

By this the entity signing the signature cannot deny it in the future.

  • Government uses

The U.S. Government uses digital signature for authenticating budgets, public and private laws and congressional bills with digital signatures, processing tax returns, verifying business-to-government transactions, ratifying laws and managing contracts.

  • Healthcare

Used in the healthcare sector to improve the efficiency of treatment and administrative processes by strengthening data security.

Please do hit a like if you find my answer satisfactory!


Related Solutions

Discuss how different types of encryption systems work, and explain how digital signatures provide the means...
Discuss how different types of encryption systems work, and explain how digital signatures provide the means for creating legally-enforceable contracts.
Discuss how the advent of the digital revolution, its components, has changed over time from the...
Discuss how the advent of the digital revolution, its components, has changed over time from the beginning of the digital revolution- to how we use digital technology today. Explain where you see technology going in the future and how responsible stewardship can or cannot impact the future of the internet.
Discuss has home mortgage lending changed in the last 10 years. What are the key differences...
Discuss has home mortgage lending changed in the last 10 years. What are the key differences between borrowing in 2007 and today? Provide support from news articles. Do you have a formal budget? Why/why not? What do you think are the reasons why people do not make formal budgets? Should young couples with two incomes consider taking on much less debt than might otherwise be appropriate for their level of income? Explain.
Has Saudi Arabia changed in terms of type of economy in the last 10 years? How?...
Has Saudi Arabia changed in terms of type of economy in the last 10 years? How? answer with 100 words, please do not answer in professional way
how has family life changed in the United States in the last 40 years? In your...
how has family life changed in the United States in the last 40 years? In your opinion, what has caused some of these changes to occur? 2) Read over the Functions of the Family in the lecture notes. Many experts say that the family does not function in the way that it should and that other institutions have replaced the family. For example, the education system and the child care system have replaced the primary functions of families, socialization. Schools...
How has accounting for in Process R&D Costs (in acquisitions) changed in the last few years?
How has accounting for in Process R&D Costs (in acquisitions) changed in the last few years?
Briefly discuss the following: 1. Events that changed the world in microbiology. (20 marks) 2. Microbiology...
Briefly discuss the following: 1. Events that changed the world in microbiology. 2. Microbiology came about looking for the mystery of life. Do you agree? Why?
How has the American economy changed over the past 20 years? Who benefits and who loses...
How has the American economy changed over the past 20 years? Who benefits and who loses from this transition? What role has the U.S. government played in trying to smooth this transition for American workers? What additional measures do you think the government could implement to help workers? What can be done at the federal, state, and local levels? What changes have you seen in your schools and universities that reflect the changes that are taking place in the economy?...
How do you think police discretion toward juveniles has changed in the last 50 years? Why??
How do you think police discretion toward juveniles has changed in the last 50 years? Why??
Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has...
Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has the RSA key(eB, dB, nB), where eA, eB, nA, and nB are public, dA is known only to Alice, and dB is known only to Bob. (a) Describe how Alice could use her RSA key to sign a public message m, and explain why this approach satisfies the objective of non repudiation. (b) Describe how Alice could encrypt and send a secret message to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT