SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
SSL Europa - 8 chemin des escargots - 18200 Orval - France T: +33 (0)9 88 99 54 09
White paper
Electronic signature today and
tomorrow
Date : Friday, 28th June 2013
Edition : V01
2
Summary
1. New challenges................................................................................................................................ 3
2. Encoding messages.......................................................................................................................... 3
3. Asymmetric cryptography (for experts).......................................................................................... 3
4. Electronic signature (for experts).................................................................................................... 4
5. What’s about the law ? ................................................................................................................... 4
6. Example of implementation of the electronic signature ................................................................ 4
7. Examples of use............................................................................................................................... 7
Signing emails...................................................................................................................................... 7
Signing of contracts............................................................................................................................. 7
Signature of business proposals sent to clients .................................................................................. 7
Multiples signing contracts on a website............................................................................................ 7
3
1. New challenges
All the rules of trust are disrupted by the digital world. Through the History we established trusting
relationships, signed contracts, affixed seals, used trust third party such as notaries, witnesses,
deliver official documents, implemented issuance process, a face-to-face, used confidential
documents sealed, etc. New rules were established in the digital world. Major risks remain. Major
opportunities also appear.
2. Encoding messages
Since ancient times, men have encoded messages so that they cannot be intercepted. Literature and
cinema are filled with military, espionage or love stories about encrypted messages. The most
famous code is the Cesar code. The principle known cryptographic (from the Greek: Crypto, hidden
and Graphos, drawing) is to apply a combination to a text in order to no one can read it, then to the
person who received this text to apply the “reverse” combination in order to decrypt it. Cesar used
this technic to communicate with the different parts of his army on the battlefield.
3. Asymmetric cryptography (for experts)
In 1975, Wilfried Diffie and Martin Hellman developed a mathematical algorithm that can be
different to encrypt and decrypt a document. There was a key allowing to encrypt and a different
one, allowing to decrypt the document. Someway, a key allows to close a locked safe and another
one to open it. This technic was named asymmetric cryptography, as opposed to the symmetric
cryptography.
With symmetric cryptography, it was possible to deduct the decryption process thanks to the
encryption method. This is not the case with the asymmetric cryptography. This discovery had a
significant impact.
The symmetric cryptography included major problems. It was necessary to give the encryption
combination with the person who had to make the decryption. It was a different key to communicate
with each party confidentially. It required an important list of keys. This technic was not efficient in
the digital world. The asymmetric cryptography was the new solution because each person has his
private key that nobody else knows and a public key that everybody knows and that can be freely
exchanged.
If we encrypt a message with the public key, only the person with the corresponding private key can
decrypt the message. It is no longer necessary for each person to keep confidential a set of
symmetric keys for each partner with whom we want to communicate with an encrypted way.
4
4. Electronic signature (for experts)
But this technology also enabled a new application! If a person sends me an encrypted document
with his private key and that his corresponding public key succeed to decrypt, it means that the
message comes from the person who have encrypted the document. Indeed, only the public key
corresponding to the private key allows to decrypt the document. Electronic signature was born with
its many applications and uses.
5. What’s about the law?
The law n°2000-230 of 13rd March 2000 adapting the law of evidence in information technology and
on the electronic signature says:
“Art. 1316. – The documentary evidence or written evidence, is the result of a succession of letters,
characters, numbers or any other signs or symbols with an intelligible meaning, whatever their
support and transmission modalities.”
“Art. 1316-1. - The writing in electronic form is admissible as evidence as well as the written word on
paper, provided that can be duly identified the person from whom it emanates and it is established
and maintained under conditions that ensure the integrity.”
“Art. 1316-2. - - Where the law does not set any other principles, and in the absence of valid
agreement between the parties, the judge rules conflicts documentary evidence as determined by all
means the most likely way, regardless of the support.”
6. Example of implementation of the electronic signature
You can order with a Trusted Third Party organization, a signing cryptographic USB key. The Trusted
Third Party is an organization which is authorized by the government to deliver electronic certificates
after having realized an Audit. The Trusted Third Party has also developed agreements with software
editors such as Microsoft or Adobe, so that their certificates are recognized trust.
The Trusted Third Party will check your identity in asking, asking you for an ID card, will find you in
the directory, then call you in order to check it is really you. Then, they will give you this
cryptographic USB key and a secret PIN.
For signing your documents and emails, you insert your cryptographic key in your computer, sign
from the menu of your document or emails editor, must enter your PIN and your documents will be
signed. You can choose to make the signature apparent via a picture or not. By clicking on this picture
you can see the information on the signature. Adobe Acrobat is an example of tool to sign
documents. Adobe Acrobat also allows to add signature fields that can be signed via Adobe Reader
which is a free software widely available.
Note 1: Attention to what is commonly accepted. A PDF document can be editable with an adapted
text editor such as Adobe Acrobat. Only a PDF document electronically signed cannot be edited
without losing the signature.
5
Note 2: The screenshot of a handwritten signature added to an electronic document has no legal
value.
PDF Signature
6
Outlook electronic signature.
7
7. Examples of use
Signing emails
It is easy to create an email appearing to be from another person. For example, a research office uses
cryptographic USB keys to sign and encrypt its documents and emails. So, the source is guaranteed.
Neither the email nor the documents also joint could not be altered. Nobody was able to intercept
the information exchanged. The risk is reduced to 99,99%.
Signing of contracts
A call center works with offshore companies and uses the electronic signature in order to sign
contracts. The contracts signed by both parties cannot be changed anymore. 15 days are gained on
each exchange of contract.
Signature of business proposals sent to clients
A bank send business proposals for new services to all its customers. These documents are
electronically signed with an automatic signature tool. They can be read with Acrobat Reader which
is a free software. The customers are reassured about the provenance of the document.
20% increase in sales proposals considered.
Multiples signing contracts on a website
An insurance company offers new contracts. The clients can sign the contracts online. A SMS code is
sent to them. The IP address, the phone number and the date of the server timestamp at the
moment of the electronic signature on the fly on the web site are archived. This contract has a
probative value. Clients feel engaged. The conversion rate of prospect accessing the website in
increased by 17%.
Thereby, the use of the electronic signature corresponds to a real need in the digital world. There
is no doubt that this technology will become more widespread and is destined for a great future.

Contenu connexe

Tendances

3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of DataMomina Mateen
 
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous TransactionAn Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous TransactionIDES Editor
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...IOSR Journals
 
A low pre processing system for low quality QR code
A low pre processing system for low quality QR codeA low pre processing system for low quality QR code
A low pre processing system for low quality QR codeshameedcm3
 
Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)SeungilChung2
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009EuroCloud
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information securityDATA SECURITY SOLUTIONS
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfStephen Rappaport
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiquestioninginstitute
 

Tendances (19)

3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous TransactionAn Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction
An Enhanced Privacy Preserving Buyer-Seller Protocol for Anonymous Transaction
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 
A low pre processing system for low quality QR code
A low pre processing system for low quality QR codeA low pre processing system for low quality QR code
A low pre processing system for low quality QR code
 
Digital Certificate Email usage
Digital Certificate Email usageDigital Certificate Email usage
Digital Certificate Email usage
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
 
Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)Blaa white paper ver1.0.9.final(en)
Blaa white paper ver1.0.9.final(en)
 
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
Nat Sakimura Presentation / CloudViews.Org Cloud Computing Conference 2009
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information security
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
QR code
QR codeQR code
QR code
 
Social media ethics and concerns
Social media ethics and concernsSocial media ethics and concerns
Social media ethics and concerns
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arf
 
Qr code
Qr codeQr code
Qr code
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qi
 

Similaire à Digital signature by SSL Europa

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscDSC Delhi
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawDocuSign
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-SigningNamirial GmbH
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfDIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfFilingBee
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

Similaire à Digital signature by SSL Europa (20)

Ds over
Ds overDs over
Ds over
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-Signing
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
My DocSafe white paper 1
My DocSafe white paper 1My DocSafe white paper 1
My DocSafe white paper 1
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfDIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Plus de ssleuropa

Comment obtenir une clé de signature RGS avec SSL Europa?
Comment obtenir une clé de signature RGS avec SSL Europa? Comment obtenir une clé de signature RGS avec SSL Europa?
Comment obtenir une clé de signature RGS avec SSL Europa? ssleuropa
 
Comment obtenir un certificat SSL pour sécuriser son site internet?
Comment obtenir un certificat SSL pour sécuriser son site internet? Comment obtenir un certificat SSL pour sécuriser son site internet?
Comment obtenir un certificat SSL pour sécuriser son site internet? ssleuropa
 
Signature électronique par SSL Europa
Signature électronique par SSL EuropaSignature électronique par SSL Europa
Signature électronique par SSL Europassleuropa
 
Comment choisir son certificat ssl fr v01
Comment choisir son certificat ssl fr v01Comment choisir son certificat ssl fr v01
Comment choisir son certificat ssl fr v01ssleuropa
 
SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013ssleuropa
 
Secure your digital world v01
Secure your digital world v01Secure your digital world v01
Secure your digital world v01ssleuropa
 
Sécurité du monde numérique v01
Sécurité du monde numérique v01Sécurité du monde numérique v01
Sécurité du monde numérique v01ssleuropa
 

Plus de ssleuropa (7)

Comment obtenir une clé de signature RGS avec SSL Europa?
Comment obtenir une clé de signature RGS avec SSL Europa? Comment obtenir une clé de signature RGS avec SSL Europa?
Comment obtenir une clé de signature RGS avec SSL Europa?
 
Comment obtenir un certificat SSL pour sécuriser son site internet?
Comment obtenir un certificat SSL pour sécuriser son site internet? Comment obtenir un certificat SSL pour sécuriser son site internet?
Comment obtenir un certificat SSL pour sécuriser son site internet?
 
Signature électronique par SSL Europa
Signature électronique par SSL EuropaSignature électronique par SSL Europa
Signature électronique par SSL Europa
 
Comment choisir son certificat ssl fr v01
Comment choisir son certificat ssl fr v01Comment choisir son certificat ssl fr v01
Comment choisir son certificat ssl fr v01
 
SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013
 
Secure your digital world v01
Secure your digital world v01Secure your digital world v01
Secure your digital world v01
 
Sécurité du monde numérique v01
Sécurité du monde numérique v01Sécurité du monde numérique v01
Sécurité du monde numérique v01
 

Dernier

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Dernier (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 

Digital signature by SSL Europa

  • 1. SSL Europa - 8 chemin des escargots - 18200 Orval - France T: +33 (0)9 88 99 54 09 White paper Electronic signature today and tomorrow Date : Friday, 28th June 2013 Edition : V01
  • 2. 2 Summary 1. New challenges................................................................................................................................ 3 2. Encoding messages.......................................................................................................................... 3 3. Asymmetric cryptography (for experts).......................................................................................... 3 4. Electronic signature (for experts).................................................................................................... 4 5. What’s about the law ? ................................................................................................................... 4 6. Example of implementation of the electronic signature ................................................................ 4 7. Examples of use............................................................................................................................... 7 Signing emails...................................................................................................................................... 7 Signing of contracts............................................................................................................................. 7 Signature of business proposals sent to clients .................................................................................. 7 Multiples signing contracts on a website............................................................................................ 7
  • 3. 3 1. New challenges All the rules of trust are disrupted by the digital world. Through the History we established trusting relationships, signed contracts, affixed seals, used trust third party such as notaries, witnesses, deliver official documents, implemented issuance process, a face-to-face, used confidential documents sealed, etc. New rules were established in the digital world. Major risks remain. Major opportunities also appear. 2. Encoding messages Since ancient times, men have encoded messages so that they cannot be intercepted. Literature and cinema are filled with military, espionage or love stories about encrypted messages. The most famous code is the Cesar code. The principle known cryptographic (from the Greek: Crypto, hidden and Graphos, drawing) is to apply a combination to a text in order to no one can read it, then to the person who received this text to apply the “reverse” combination in order to decrypt it. Cesar used this technic to communicate with the different parts of his army on the battlefield. 3. Asymmetric cryptography (for experts) In 1975, Wilfried Diffie and Martin Hellman developed a mathematical algorithm that can be different to encrypt and decrypt a document. There was a key allowing to encrypt and a different one, allowing to decrypt the document. Someway, a key allows to close a locked safe and another one to open it. This technic was named asymmetric cryptography, as opposed to the symmetric cryptography. With symmetric cryptography, it was possible to deduct the decryption process thanks to the encryption method. This is not the case with the asymmetric cryptography. This discovery had a significant impact. The symmetric cryptography included major problems. It was necessary to give the encryption combination with the person who had to make the decryption. It was a different key to communicate with each party confidentially. It required an important list of keys. This technic was not efficient in the digital world. The asymmetric cryptography was the new solution because each person has his private key that nobody else knows and a public key that everybody knows and that can be freely exchanged. If we encrypt a message with the public key, only the person with the corresponding private key can decrypt the message. It is no longer necessary for each person to keep confidential a set of symmetric keys for each partner with whom we want to communicate with an encrypted way.
  • 4. 4 4. Electronic signature (for experts) But this technology also enabled a new application! If a person sends me an encrypted document with his private key and that his corresponding public key succeed to decrypt, it means that the message comes from the person who have encrypted the document. Indeed, only the public key corresponding to the private key allows to decrypt the document. Electronic signature was born with its many applications and uses. 5. What’s about the law? The law n°2000-230 of 13rd March 2000 adapting the law of evidence in information technology and on the electronic signature says: “Art. 1316. – The documentary evidence or written evidence, is the result of a succession of letters, characters, numbers or any other signs or symbols with an intelligible meaning, whatever their support and transmission modalities.” “Art. 1316-1. - The writing in electronic form is admissible as evidence as well as the written word on paper, provided that can be duly identified the person from whom it emanates and it is established and maintained under conditions that ensure the integrity.” “Art. 1316-2. - - Where the law does not set any other principles, and in the absence of valid agreement between the parties, the judge rules conflicts documentary evidence as determined by all means the most likely way, regardless of the support.” 6. Example of implementation of the electronic signature You can order with a Trusted Third Party organization, a signing cryptographic USB key. The Trusted Third Party is an organization which is authorized by the government to deliver electronic certificates after having realized an Audit. The Trusted Third Party has also developed agreements with software editors such as Microsoft or Adobe, so that their certificates are recognized trust. The Trusted Third Party will check your identity in asking, asking you for an ID card, will find you in the directory, then call you in order to check it is really you. Then, they will give you this cryptographic USB key and a secret PIN. For signing your documents and emails, you insert your cryptographic key in your computer, sign from the menu of your document or emails editor, must enter your PIN and your documents will be signed. You can choose to make the signature apparent via a picture or not. By clicking on this picture you can see the information on the signature. Adobe Acrobat is an example of tool to sign documents. Adobe Acrobat also allows to add signature fields that can be signed via Adobe Reader which is a free software widely available. Note 1: Attention to what is commonly accepted. A PDF document can be editable with an adapted text editor such as Adobe Acrobat. Only a PDF document electronically signed cannot be edited without losing the signature.
  • 5. 5 Note 2: The screenshot of a handwritten signature added to an electronic document has no legal value. PDF Signature
  • 7. 7 7. Examples of use Signing emails It is easy to create an email appearing to be from another person. For example, a research office uses cryptographic USB keys to sign and encrypt its documents and emails. So, the source is guaranteed. Neither the email nor the documents also joint could not be altered. Nobody was able to intercept the information exchanged. The risk is reduced to 99,99%. Signing of contracts A call center works with offshore companies and uses the electronic signature in order to sign contracts. The contracts signed by both parties cannot be changed anymore. 15 days are gained on each exchange of contract. Signature of business proposals sent to clients A bank send business proposals for new services to all its customers. These documents are electronically signed with an automatic signature tool. They can be read with Acrobat Reader which is a free software. The customers are reassured about the provenance of the document. 20% increase in sales proposals considered. Multiples signing contracts on a website An insurance company offers new contracts. The clients can sign the contracts online. A SMS code is sent to them. The IP address, the phone number and the date of the server timestamp at the moment of the electronic signature on the fly on the web site are archived. This contract has a probative value. Clients feel engaged. The conversion rate of prospect accessing the website in increased by 17%. Thereby, the use of the electronic signature corresponds to a real need in the digital world. There is no doubt that this technology will become more widespread and is destined for a great future.