SlideShare a Scribd company logo
Page 1




User-Friendly Digital Signatures
           Jon Matonis, CEO, Hush Communications




             Digital Identity Forum
                 October 17 & 18th 2000
                    Marlborough Hotel
                       London, UK



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                          Page 2




                    Overview

• Digital Signatures & the Market
• What are Digital Signatures ?
• Signatures v. Certificates
• Complex PKI Deployments
• The Hush Communications Solution: Technology
• The Hush Communications Solution: Trust
• Contact Hush



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    1
Page 3




 Digital Signatures & the Market

    • Until recently, digital signatures were not
      considered legally binding within the United
      States;
    • Europe has been quicker to adopt digital
      signatures as a replacement for the traditional
      written signature;
    • Touted as the link between consumers and e-
       commerce, digital signatures are an emerging
       technology poised to generate significantly larger
       transaction sizes.
                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                        Page 4




       What are Digital Signatures ?

• Digital signatures verify with mathematical
  certainty that the message, document, or
  other media received originated from the
  anticipated sender (authentication);
• Digital signatures ensure that what you send
  over the Internet is exactly what is received at
  the other end (integrity);

                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                                  2
Page 5




       What are Digital Signatures ?

• Digital signatures ensure that someone
  cannot deny that they authorized a particular
  transaction (non-repudiation);
• There are multiple ways to create digital
  signatures, including biometrics, like face
  printing and retina scans, but the most
  common methods involve cryptographic
  algorithms and protocols.
                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                   Page 6




          Signatures v. Certificates

• A digital signature is created by encrypting
  data with a private key.
• A digital certificate is a public key that is
  digitally signed by a Certificate Authority (CA).




                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                             3
Page 7




         Complex PKI Deployments

• Issuing a digital certificate can cost anywhere
  from $5 to $10 per customer.
• The enterprise software needed to manage the
  key, which decrypts and encrypts a message, can
  cost as much as $10 to $100 a person.
• Consumers must pay a periodic fee for the use of
  a digital certificate.
• Most signing devices are linked to a particular PC
  or network.
                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                     Page 8




         Complex PKI Deployments

• The private portion of the digital identity must
  be accessible exclusively to the owner and
  must be used to decrypt and sign data.
• Most PKI solutions require that the user
  possess their private key, which is inherently
  unsafe and reliant upon properly configured
  hardware.

                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                               4
Page 9




         Complex PKI Deployments

• PKI-based digital certificates are inefficient
  and cumbersome where a certificate is
  required to authenticate an individual user.
• Traditional PKI doesn’t have roaming
  capability.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 10




   The Hush Communications Solution

  The Hush Encryption Engine ™ allows end-
  users to store their private key on a Hush
  server. The user doesn’t have to carry a
  private key, smart card, or store the key on a
  hard drive. However, even though Hush
  manages the private key, it is always
  encrypted and is inaccessible to anyone at
  Hush or elsewhere.
                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              5
Page 11




   The Hush Communications Solution

• The Hush Encryption Engine ™ ensures that
  no one but you can access your private key.
• The Engine doesn’t tie you to a single
  computer.
• The Engine is compatible with multiple online
  applications.
• The Engine works with the Java ™
  technology in most common Web browsers.                       October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 12




               Hush Technology

• Hush users generate their private key on their own
  computer first, during signup of installation, and
  encrypt it with a passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 6
Page 13




                Hush Technology

• And then, upload the encrypted private key to one of
  the Hush servers.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 14




                Hush Technology

• After that, whenever a user starts a secure
  communications session, the private key
  automatically is retrieved from the server.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 7
Page 15




                Hush Technology

• And finally, decrypted with the user’s passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 16




      IMPORTANT SECURITY NOTE

• When the private key resides on a Hush key
  server, it is encrypted with a passphrase.
  That passphrase NEVER leaves the user’s
  computer. At no point is the private key or any
  private data accessible to anyone at Hush.
  Even if Hush were to be subpoenaed, we
  would not be able to learn or reveal your
  private key.
                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 8
Page 17




           Hush Digital Signatures

• Hush offers its users the option to digitally
  sign their email and attachments.
• Hush’s digital signature feature is a method
  for the individual user to authenticate their
  online identity.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 18




                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              9
Page 19




                     October 23, 00
Copyright 2000 Hush Communications




                           Page 20




                     October 23, 00
Copyright 2000 Hush Communications




                                      10
Page 21




   Sending a Digitally Signed Message

• First, the data is signed with the user’s private key,
  which the user retrieved at the start of the session,
  when the user logs in with their passphrase.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 22




       Signed Message is Transmitted

• Then, the signed data is sent on to its final
  destination.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    11
Page 23




   Verifying a Digitally Signed Message

• First, the signed data arrives at the recipient’s
  computer.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 24




   Verifying a Digitally Signed Message

• Then, the sender’s public key is automatically
  retrieved from a Hush key server.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    12
Page 25




   Verifying a Digitally Signed Message

• Finally, the public key is used to verify the
  authenticity and integrity of the data.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 26




    The Hush Communications Solution

• Hush offers Private Label services as a way
  for leading companies to brand their secure
  messaging.
• Trusted Private Label partners control the
  registration and revocation process.
• Digital signatures are enforced and backed
  up by the policies of the Private Label
  partner.                                                         October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    13
Page 27




 Contact Hush Communications

Worldwide                Sales & Business
Headquarters             Development Office
Hush Communications      Hush Communications
22 Upper Pembroke St.    2825 E. Cottonwood
Dublin 2, Ireland        Parkway, Ste. 500
Phone +353-1-241-0303    Salt Lake City, UT 84121
Fax    +353-1-241-0370   Phone +801-990-3490
alliances@hushmail.com   Fax   +801-990-3111
                         sales@hushmail.com


                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              14

More Related Content

PPTX
Drm digital rights managment-june2014-tarek gaber
PPT
Introducing the Information Technology Act [Scriboard]
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPTX
Blockchain
PPTX
3.5 Online Services and Security and Privacy of Data
PPTX
Digital signature by mohsin iftikhar
PPTX
3.1 Online Services (Part 1)
PPTX
What is bitcoin?
Drm digital rights managment-june2014-tarek gaber
Introducing the Information Technology Act [Scriboard]
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Blockchain
3.5 Online Services and Security and Privacy of Data
Digital signature by mohsin iftikhar
3.1 Online Services (Part 1)
What is bitcoin?

What's hot (19)

DOC
Technical seminar
PDF
Navigating the World of Cloud Computing
PDF
Presentazione
PPSX
PPTX
Electronic signature
PPTX
Introduction to blockchain
DOC
Chapter 06 Information Technology Act 2000
PPTX
Moldova kick starting effective digitisation v104 shamah
PPTX
Digital Cash Overview
PDF
Mobile Financial Services
PDF
CubeIQ | SID banknotes deposit
PPTX
Digital Signatures
PDF
20150522_Woobe_Information Kit_Light
PPT
Authenticationtechnologies 120711134100-phpapp01
PPTX
The use cases of blockchain technology
PDF
Future of digital identity initial perspective - final lr
PDF
Blockchain presentation v0617
PPTX
E-Signature Vs. Digital Signature
Technical seminar
Navigating the World of Cloud Computing
Presentazione
Electronic signature
Introduction to blockchain
Chapter 06 Information Technology Act 2000
Moldova kick starting effective digitisation v104 shamah
Digital Cash Overview
Mobile Financial Services
CubeIQ | SID banknotes deposit
Digital Signatures
20150522_Woobe_Information Kit_Light
Authenticationtechnologies 120711134100-phpapp01
The use cases of blockchain technology
Future of digital identity initial perspective - final lr
Blockchain presentation v0617
E-Signature Vs. Digital Signature
Ad

Similar to User-Friendly Digital Signatures (20)

PPTX
Public key infrastructure
PPT
Digital Signiture
PDF
Wisekey italia presentation 2012
PPTX
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
PPT
Digital signature
PPTX
Public Digital Identity as a Service
PPTX
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
PPTX
The VDI InfoSec Conundrum
PDF
Cryptointro
PPTX
Digital signatur
PPTX
PPT
Online bankingsecurity
DOCX
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PDF
Rsa Secur Id From Signify
PDF
Rsa Secur Id From Signify
PDF
2012 Accumulate Mobile Everywhere Introduction
PPT
Digital Signature
PDF
Public key authentication is the most secure colution and utilizes a.pdf
Public key infrastructure
Digital Signiture
Wisekey italia presentation 2012
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Digital signature
Public Digital Identity as a Service
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
The VDI InfoSec Conundrum
Cryptointro
Digital signatur
Online bankingsecurity
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
Rsa Secur Id From Signify
Rsa Secur Id From Signify
2012 Accumulate Mobile Everywhere Introduction
Digital Signature
Public key authentication is the most secure colution and utilizes a.pdf
Ad

More from Jon Matonis (20)

PDF
Anarchy and Money (Institute for Monetary Freedom, 1984)
PPTX
eCom21: Bitcoin exchanges state of the market 2015
DOCX
Booz Allen Hamilton Money Unbound 2015
PDF
Family Office Forum Zurich 2014
DOCX
Society for the Study of Gambling 20 Jan 2015
PDF
EuroFinance Miami 2015
PDF
EuroFinance Singapore 2015
PDF
EuroFinance Budapest 2014
PPTX
Amplify 2015
PPTX
State of the Market: Bitcoin in Gambling
PPT
PPT
Login 2014 Vilnius
PPT
The Appeal of a Nonpolitical Currency
PPT
Bitcoin in the iGaming Environment
PPT
Bitcoin: Cash Becoming Digital
PPT
The Evolution of e-Money (DeepSec)
PPT
The Evolution of E-Money
PDF
MileMoney, Inc. - The People's Currency
PDF
PayPal Still Dominates Online Payment Industry - ppg 4-5
PDF
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
Anarchy and Money (Institute for Monetary Freedom, 1984)
eCom21: Bitcoin exchanges state of the market 2015
Booz Allen Hamilton Money Unbound 2015
Family Office Forum Zurich 2014
Society for the Study of Gambling 20 Jan 2015
EuroFinance Miami 2015
EuroFinance Singapore 2015
EuroFinance Budapest 2014
Amplify 2015
State of the Market: Bitcoin in Gambling
Login 2014 Vilnius
The Appeal of a Nonpolitical Currency
Bitcoin in the iGaming Environment
Bitcoin: Cash Becoming Digital
The Evolution of e-Money (DeepSec)
The Evolution of E-Money
MileMoney, Inc. - The People's Currency
PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
project resource management chapter-09.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
The various Industrial Revolutions .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Hybrid model detection and classification of lung cancer
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Chapter 5: Probability Theory and Statistics
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Zenith AI: Advanced Artificial Intelligence
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Enhancing emotion recognition model for a student engagement use case through...
Module 1.ppt Iot fundamentals and Architecture
project resource management chapter-09.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
The various Industrial Revolutions .pptx
A novel scalable deep ensemble learning framework for big data classification...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
STKI Israel Market Study 2025 version august
Hybrid model detection and classification of lung cancer
DP Operators-handbook-extract for the Mautical Institute
NewMind AI Weekly Chronicles – August ’25 Week III
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Chapter 5: Probability Theory and Statistics

User-Friendly Digital Signatures

  • 1. Page 1 User-Friendly Digital Signatures Jon Matonis, CEO, Hush Communications Digital Identity Forum October 17 & 18th 2000 Marlborough Hotel London, UK October 23, 00 Copyright 2000 Hush Communications Page 2 Overview • Digital Signatures & the Market • What are Digital Signatures ? • Signatures v. Certificates • Complex PKI Deployments • The Hush Communications Solution: Technology • The Hush Communications Solution: Trust • Contact Hush October 23, 00 Copyright 2000 Hush Communications 1
  • 2. Page 3 Digital Signatures & the Market • Until recently, digital signatures were not considered legally binding within the United States; • Europe has been quicker to adopt digital signatures as a replacement for the traditional written signature; • Touted as the link between consumers and e- commerce, digital signatures are an emerging technology poised to generate significantly larger transaction sizes. October 23, 00 Copyright 2000 Hush Communications Page 4 What are Digital Signatures ? • Digital signatures verify with mathematical certainty that the message, document, or other media received originated from the anticipated sender (authentication); • Digital signatures ensure that what you send over the Internet is exactly what is received at the other end (integrity); October 23, 00 Copyright 2000 Hush Communications 2
  • 3. Page 5 What are Digital Signatures ? • Digital signatures ensure that someone cannot deny that they authorized a particular transaction (non-repudiation); • There are multiple ways to create digital signatures, including biometrics, like face printing and retina scans, but the most common methods involve cryptographic algorithms and protocols. October 23, 00 Copyright 2000 Hush Communications Page 6 Signatures v. Certificates • A digital signature is created by encrypting data with a private key. • A digital certificate is a public key that is digitally signed by a Certificate Authority (CA). October 23, 00 Copyright 2000 Hush Communications 3
  • 4. Page 7 Complex PKI Deployments • Issuing a digital certificate can cost anywhere from $5 to $10 per customer. • The enterprise software needed to manage the key, which decrypts and encrypts a message, can cost as much as $10 to $100 a person. • Consumers must pay a periodic fee for the use of a digital certificate. • Most signing devices are linked to a particular PC or network. October 23, 00 Copyright 2000 Hush Communications Page 8 Complex PKI Deployments • The private portion of the digital identity must be accessible exclusively to the owner and must be used to decrypt and sign data. • Most PKI solutions require that the user possess their private key, which is inherently unsafe and reliant upon properly configured hardware. October 23, 00 Copyright 2000 Hush Communications 4
  • 5. Page 9 Complex PKI Deployments • PKI-based digital certificates are inefficient and cumbersome where a certificate is required to authenticate an individual user. • Traditional PKI doesn’t have roaming capability. October 23, 00 Copyright 2000 Hush Communications Page 10 The Hush Communications Solution The Hush Encryption Engine ™ allows end- users to store their private key on a Hush server. The user doesn’t have to carry a private key, smart card, or store the key on a hard drive. However, even though Hush manages the private key, it is always encrypted and is inaccessible to anyone at Hush or elsewhere. October 23, 00 Copyright 2000 Hush Communications 5
  • 6. Page 11 The Hush Communications Solution • The Hush Encryption Engine ™ ensures that no one but you can access your private key. • The Engine doesn’t tie you to a single computer. • The Engine is compatible with multiple online applications. • The Engine works with the Java ™ technology in most common Web browsers. October 23, 00 Copyright 2000 Hush Communications Page 12 Hush Technology • Hush users generate their private key on their own computer first, during signup of installation, and encrypt it with a passphrase. October 23, 00 Copyright 2000 Hush Communications 6
  • 7. Page 13 Hush Technology • And then, upload the encrypted private key to one of the Hush servers. October 23, 00 Copyright 2000 Hush Communications Page 14 Hush Technology • After that, whenever a user starts a secure communications session, the private key automatically is retrieved from the server. October 23, 00 Copyright 2000 Hush Communications 7
  • 8. Page 15 Hush Technology • And finally, decrypted with the user’s passphrase. October 23, 00 Copyright 2000 Hush Communications Page 16 IMPORTANT SECURITY NOTE • When the private key resides on a Hush key server, it is encrypted with a passphrase. That passphrase NEVER leaves the user’s computer. At no point is the private key or any private data accessible to anyone at Hush. Even if Hush were to be subpoenaed, we would not be able to learn or reveal your private key. October 23, 00 Copyright 2000 Hush Communications 8
  • 9. Page 17 Hush Digital Signatures • Hush offers its users the option to digitally sign their email and attachments. • Hush’s digital signature feature is a method for the individual user to authenticate their online identity. October 23, 00 Copyright 2000 Hush Communications Page 18 October 23, 00 Copyright 2000 Hush Communications 9
  • 10. Page 19 October 23, 00 Copyright 2000 Hush Communications Page 20 October 23, 00 Copyright 2000 Hush Communications 10
  • 11. Page 21 Sending a Digitally Signed Message • First, the data is signed with the user’s private key, which the user retrieved at the start of the session, when the user logs in with their passphrase. October 23, 00 Copyright 2000 Hush Communications Page 22 Signed Message is Transmitted • Then, the signed data is sent on to its final destination. October 23, 00 Copyright 2000 Hush Communications 11
  • 12. Page 23 Verifying a Digitally Signed Message • First, the signed data arrives at the recipient’s computer. October 23, 00 Copyright 2000 Hush Communications Page 24 Verifying a Digitally Signed Message • Then, the sender’s public key is automatically retrieved from a Hush key server. October 23, 00 Copyright 2000 Hush Communications 12
  • 13. Page 25 Verifying a Digitally Signed Message • Finally, the public key is used to verify the authenticity and integrity of the data. October 23, 00 Copyright 2000 Hush Communications Page 26 The Hush Communications Solution • Hush offers Private Label services as a way for leading companies to brand their secure messaging. • Trusted Private Label partners control the registration and revocation process. • Digital signatures are enforced and backed up by the policies of the Private Label partner. October 23, 00 Copyright 2000 Hush Communications 13
  • 14. Page 27 Contact Hush Communications Worldwide Sales & Business Headquarters Development Office Hush Communications Hush Communications 22 Upper Pembroke St. 2825 E. Cottonwood Dublin 2, Ireland Parkway, Ste. 500 Phone +353-1-241-0303 Salt Lake City, UT 84121 Fax +353-1-241-0370 Phone +801-990-3490 alliances@hushmail.com Fax +801-990-3111 sales@hushmail.com October 23, 00 Copyright 2000 Hush Communications 14