Digital signatures are comprised of a series of algorithms and mathematical constructs that ensure the authenticity and verifiability of a person signing a specific document. The reliance on digital signatures continues to increase as virtual work teams, the development of automated contract management, compliance, financial reporting and advanced workflows in the fields of financial services continues to grow (Keenan, 2005). The intent of this analysis is to define the properties and usage of digital signatures, evaluate how legal digital signatures are to stand up in court, and explain the security challenges of digital signatures as well.
Properties and Usage of Digital Signatures
The foundational technology elements of digital signatures are predicated on mathematical algorithms used for supporting advanced asymmetric cryptography including the option of repudiation and non-repudiation (Borasky, 1999). These two areas of repudiation and non-repudiation are essential for ensuring the authenticity and veracity of the person(s) signing are in fact who they say they are (Levin, 2007). Additional properties of digital signatures include private key and cryptographic verification using protocols specifically designed for this purpose (Keenan, 2005). The cryptographic algorithms used must be compatible with the key generation, signing and signature verifying algorithms to ensure digital signatures perform as a common foundation for document security and validation. The area of key generation is one that has seen the greatest number of patents as many enterprise software, messaging and platform providers all look to create a proprietary advantage in their software using this technique (Levin,...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now