Thursday, May 3, 2012

How to See the Same Effects with Digital Signatures

By Gerard Volegna


There has been a massive distribution and transfer of files over the internet nowadays. This means that there is a wide certainty that some of these files are distributed legally. In this scenario, there will always be a victim and a criminal. This is the reason why digital signatures paved its way to popularity. Digital signature is a process of authenticating a document to prove that its owner is recognized and reliable rather than altered by unknown individuals. Its encryption makes the foundation of digital signatures. Encryption includes decoding and encoding data from one to another.

There is a lot of data copyright worldwide once the document is signed. It means that it ensures the signer that their documents and important files are valid and is not tampered or illegally distributed. This is especially true to the present as there are various ways of sharing illegal files online.

There can be a lot of ways to get a document/data to be authenticated. One way would be the use of user names and passwords. With this method, someone who wants to get access to a certain document need to input the data asked by the document and it needs to match the data set for the document. Then after, the data could be verified either as valid or invalid. Other way is the use of digital certificates. This is a huge scale of encryption that is not easy to be applied. And since it is hard to get hacked, there are people who use digital certificates for these documents. These digital certificates state the trust worthiness of a server and are filtered by Certificate Authority.

There are also other ways in which one can make use of digital signature for their files. The process of Cyclic Redundancy Check is a method that checks the digital certificate of the document once to check whether it is authenticated or not. This will be validated through the encryption of the information to match with the unique code from the other user. On the other hand, the Private Key encryption is the way where the owner provides the encryption key to the recipient in order for them to use the data. The Public Key, on the other hand, uses the combination of the private and public encryptions.

With the innovation in technology, there are sure lots of ways to get counterfeited. But with digital signatures, you can always be protected.




About the Author:



0 comments:

Post a Comment