19.1 C
Thursday, July 29, 2021
- Advertisement -


- Advertisement -

Must read


3D hologram

PlayStation 5

- Advertisement -
- Advertisement -

In the current era people are increasingly turning to digital signatures. digital Signature is one of the technologies used to improve network security. Digital Signature has a function as a marker on the data to ensure that data is the actual data (no change). By doing so, the Digital Signature can meet at least two network security requirements, namely Authenticity and nonrepudiation. Digital Signature How it works is by utilizing two keys, namely a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt the data.

Before getting to the recipient, electronic signatures through a few rounds. First, the sender will create a message digest is taken from the original message. The mechanism uses a hash (function dehachage). Characteristics of the message digest is identical and unique that is not easily counterfeited. Its function is similar to fingerprints. The next stage, the message digest is signed by using the private key of the sender. Then, the original message is already affixed signatures delivered to the destination. After reaching the recipient of the message, the sender gives the public key to decrypt. Questions of authenticity, can be distinguished by fingerprints. If nothing changes, then the message is authentic.

Digital signature itself is not just a wet signature is then scanned into the electronic device. Digital signature is a signature that is fully carried out in electronic devices. However, the history of the creation of the digital signature itself began long before the existence of advanced electronic devices such as a computer, smartphone, or tablet as we have today. History of digital signature starts in 1976, when Whitfield FFI e and Martin Hellman is a cryptographic experts from the United States began to trigger a digital signature scheme. Not long after, three people mathematics and cryptology expert at MIT that Ronald Rivest, Adi Shamir, and Len Adleman create RSA (Rivest-Shamir-Adleman) which is used to create a digital signature for the first time.

Then in 1988, a wide range of requirements to ensure the security of digital signatures started triggered by Shafi Goldwasser, Silvio Micali, and Ronald Rivest. Shortly thereafter, Lotus Notes 1.0 software for creating digital signatures using RSA algorithm was released.

Digital signatures began to be developed fully and is recognized internationally in the 1990s. The UN began to create special rules to regulate the use of digital signatures in line with developments. In 1996, the United Nations with its new organization UNCITRAL (United Nations Commission on International Trade Law) establishes the first legal basis for the use of digital signatures are referred to asUNCITRAL Model Law on Electronic Commerce (with Guide to Enactment 1996), Article 7 of this Act specifically addresses the digital signature which is becoming a major influence on a variety of state laws governing the use of digital signatures. In 2001, UNCITRAL issuing updatesUNCITRAL Model Law on Electronic Signature (with Guide to Enactment 2001)who discuss more about the role of validating the digital signatures in its world-renowned.

Digital signatures as we know it today was first used in 1998 by the United States and Ireland to sign an agreement that recognizes the importance of the growth of e-commerce. Then in 1999, the PDF format as we know it today was developed in order to accommodate the digital signature on the document. In the same year, the United States issued UETA (Uniform Electronic Transactions Act) which was later confirmed enforceable digital signatures in government affairs and business transactions. Then in the following year, the United States also enact legislation Electronic Signatures in Global and National Commerce Act which guarantees the validity and legality of the digital signature.

Indonesia is lagging so far from the other countries in the adoption of digital signatures. Indonesia began to adopt digital signatures when computers and smartphones have been widely used by the public. Through the Communications and Information Technology, Indonesia has recognized the use of digital signatures through Law No. 11 of 2008 on Information and Electronic Transactions. In chapter 1 verse 12 of this Act, digital signatures have a definition of “signature consisting of electronic information attached, associated, or associated with other electronic information that is used as a means of verification and authentication.”

Electronic signatures work with the support of Internet technology. Therefore, you can apply them at any time in various places. Condition, these locations should be connected to the Internet. It takes only minutes, the document contains the digital signature is received by the company or the person in question.

According to the Ministry of Communications and Information Technology, the digital signature was created to facilitate online transactions in the community. Moreover, the number of e-commerce in Indonesia is increasing. Certainly the role of the digital signature is required to speed up the transaction process.

A similar opinion was spoken by the Provincial Secretary of West Java Iwa Karniwa. Her judge, digital signatures provide many benefits for society. Besides being more secure, the technology is also environmentally friendly, efficient, easy, and fast.

Go-Go-Jek Pay from Indonesia, Setiawan Adhiputro added, policy on the application of digital signatures is very profitable businesses. According to him, the use of electronic signatures can minimize doubts consumer against the seller in the marketplace sites.

  • Secrecy or confidentiality of messages were better protected from unauthorized people to read it.
  • Data integrity is ensured. So the message is still guaranteed genuine or has never dimanifulasi during shipping.
  • More authentic as through the identification of truth communicating parties or parties berkorepondensi.
  • NIR denial. Will prevent identity berkorespondesi to perform denial of the message he had submitted. This is a consequence of the first and second points when the data and the sender’s identity can not be verified then menyangkat sender has signed the message and is usually contained in the agreement.

Terms For Electronic Signature Legal

  • Electronic signatures in order to legitimate it must meet the minimum requirements of subject and object. Terms of the subjects that must include the quality of the signatory. These data and the sign maker’s signature creation process and made known only by the owner’s signature. So the data is more protective.
  • Digital signature can be tracked and verified its validity. There is an institution Certification Authority (CA) that can issue a digital certificate, signed a certificate to verify its validity and keep track of certificates that have been revoked expiration. So if the forgery of signatures can be immediately known.
0/5 (0 Reviews)
- Advertisement -

More articles


Please enter your comment!
Please enter your name here

- Advertisement -
- Advertisement -

Latest article

- Advertisement -
- Advertisement -
0/5 (0 Reviews)