StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital Signatures and Public Key Encryption - Term Paper Example

Cite this document
Summary
The paper "Digital Signatures and Public-Key Encryption" states that financial and legal institutions can employ the use of digital signatures. Financial organizations have to deal with a massive variety of official papers, new account openings, credit and loan submissions, deposits and withdrawal slips…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful

Extract of sample "Digital Signatures and Public Key Encryption"

The traditional paper process indicates they incur high costs and delays in processing their client requires. In most cases, financial institutions must compare their client signatures to those on the paper documents before fulfilling the request. However, using digital signatures, it will allow the banks to capture the client signatures and store them in the institution’s document management system. It will make it easier to compare the signatures without having to go through dozens of client paper documents, thus saving on paper, cost, and time (Adomi 83).

For one to obtain a client’s valid handwritten signature, a law firm must scan and fax the corresponding document to a client or send it via courier services. It increases the cost and delays in processing legal matters. At times, arrangements must be made for the client to get to the office which similarly leads to delays. However, digital signatures will allow legal organizations to get client signatures in a much more efficient and timely manner to improve and accelerate the signing of contracts, agreements, and other legal documents.

Online retail and educational organizations should employ the use of digital signatures. For online retailers such as Amazon and Wal-Mart, it makes it hard to prove whether the signature provided by the client is his. One can use the digital signatures of an individual to make orders. Online retailers should instead use numbered passcodes in verifying any form of transaction with the firms (Hollie). For educational institutions, the use of digital signatures will indicate that student might lock out their parents from accessing the academic progression and other information about their children.

A parent will not have the ability to log into the school’s website until the child provides the signature. Encryption techniques have been used in the banking industry tenure security in all in-bank and client transactions. Through encryption, a bank can prove authenticity; maintain confidentiality, integrity, and non-repudiation. There is a different type of encryption techniques each having its share of merits and demerits. However, the best method for the bank to adapt is public-key encryption.

It is a form of undisclosed message concerning two parties devoid of necessitating any preliminary interchange of secret keys. The technique will allow the bank to secure its transmissions via the net especially those involving the sensitive transfer of data. Public-key encryption allows for the existence of a private and public key. The secrecy of the private key must be maintained, unlike the public key which becomes extensively circulated. The encryption of messages will depend on the public key.

However, one must have a private key for the decryption process. For the banking sector, due to its large distribution networks, the public key encryption is the best for it will be dispersed to all its customers when sending messages. Before the transmission, a secure channel is created generating a private and public key. The symmetric key encryption uses identical keys for encrypting and decrypting messages. It indicates that an individual who has the key but is not the intended recipient of the particular message will open it.

The symmetric key transmission allows for high rates of fraud in the banking industry which will affect the business in the long run.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Digital Signatures and Public Key Encryption Term Paper, n.d.)
Digital Signatures and Public Key Encryption Term Paper. https://studentshare.org/information-technology/1893885-digital-signatures-and-public-key-encryption
(Digital Signatures and Public Key Encryption Term Paper)
Digital Signatures and Public Key Encryption Term Paper. https://studentshare.org/information-technology/1893885-digital-signatures-and-public-key-encryption.
“Digital Signatures and Public Key Encryption Term Paper”. https://studentshare.org/information-technology/1893885-digital-signatures-and-public-key-encryption.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital Signatures and Public Key Encryption

Strong Named Assemblies (DOT NET)

Strong Assembly is a new technology that is built on cryptography and primary digital signatures.... In encryption, one user will get the public/private key that will be used to encrypt/decrypt.... The data is then sent to another user who undertakes an encryption process to ensure that the data has not been tempered with.... After this, the hash is encrypted by the private key of a user and attached in the system as plain data....
3 Pages (750 words) Research Paper

Business - building trust in the e-business

public key Infrastructure (PKI): with PKI security architecture which will provide secures exchange of information on internet.... Network security, Electronic commerce, public key Infrastructure, p.... Such as encryption of the date, digital signatures, public and private keys etc....
2 Pages (500 words) Essay

Mathematical Focus on RSA Public & Private Key encryption

A digital signature is a mathematical scheme that consists of three parts, namely a key generation signing algorithm, a signing algorithm and a signature verifying algorithm, and they are used in e-commerce. In the United States of America, and the European Union, there are… This paper takes a look at the various legal standings of digital signatures and their relations to RSA public and private key.... Various States in America have their own laws guiding the use of digital signatures....
5 Pages (1250 words) Research Paper

The Adoption of E-commerce as a Business Platform

There will be conflict between developing a site that is convenient and easy to use versus security concerns.... The security scare… Customer computers are the most targeted entry points of attack, and for that matter we will ensure that trust levels on both sides are at a maximum (Habiyaremye, Confidentiality will allow the authorized user to access the company information....
4 Pages (1000 words) Essay

Public Key Infrastructure

public key Infrastructure (PKI) is a type of security architecture that offers a higher level of confidence when it comes to the exchange of information over the internet.... public key Infrastructure Assignment public key Infrastructure (PKI) is a type of security architecture that offers a higher level of confidence when it comes to the exchange of information over the internet.... In addition to the private key, the CA has its public key which is published....
2 Pages (500 words) Case Study

The Impact of Internet Payment Systems upon the Retail Sector

"The Impact of Internet Payment Systems upon the Retail Sector" paper aims to identify the influence of Internet payment systems upon the grocery retail industry specifically Tesco and Walmart.... This report includes a literature review on online marketing and Internet payment systems.... hellip; There must be continuous development in maintaining a level of security online....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us