{"id":39,"date":"2004-01-12T00:00:00","date_gmt":"2004-01-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/12\/digital-signatures-and-european-laws\/"},"modified":"2021-12-30T11:36:21","modified_gmt":"2021-12-30T11:36:21","slug":"digital-signatures-and-european-laws","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/12\/digital-signatures-and-european-laws\/","title":{"rendered":"Digital Signatures And European Laws"},"content":{"rendered":"<p>The article discusses the security requirements for governments and business in electronic communication and commerce, pursuant to European laws.   It will also give an overview of current trends with public key infrastructure in Europe, useful for any organization that does business with the EU.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In electronic commerce and communication you can&#8217;t see the person you are speaking with, you can&#8217;t see the documents that prove one&#8217;s identity, and you can&#8217;t even know if the web site you are connected to belongs to the society it says.<\/p>\n<p>What will happen if I have problems with the contract and I must take it to a court of law?<\/p>\n<p>To answer these juridical necessities the European Union adopted a community framework for electronic signatures some time ago (directive 1999\/93\/EC of the European Parliament and the council of December 13, 1999, on a community framework for electronic signatures) that has been implemented in various European countries.<\/p>\n<p>A digital signature, also called an electronic signature, means data in electronic form that is used for security and trust in electronic business and communications.<\/p>\n<p>Imagine the door of a house with a two key deadbolt: the key you use to enter (public key) is not the same one required to exit (private key) so if a thief gets in the house he won&#8217;t be able to exit.<\/p>\n<p>The electronic signature working principle is this: you create some text, the text is encrypted by your private key using a mathematical relationship, you send the encrypted text, the reader who receives the text uses your publicly available key (connected to the private key) to open it, and she is then sure the text is original and it is written by you.<\/p>\n<p>It is used for authentication, to be sure the person who sent the text is the electronic signature&#8217;s holder, however you can&#8217;t be sure she is also the key owner.<\/p>\n<p>More info: [url=http:\/\/www.securityfocus.com\/infocus\/1756]http:\/\/www.securityfocus.com\/infocus\/1756[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-39","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":2526,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39\/revisions\/2526"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}