Digital Signature determines the world of tomorrow

digital signature

Digital Signature determines the world of tomorrow

digital signature

digital signature

It is well known that the bureaucracy all over the world, both in private offices and state departments, has always sought for efficient strategies to handle their documents both in paper and inside screens. This efficiency is a manner of the green environment motive but it’s also about security: Who guarantees that one has really signed a certain paper? Usually, when one has to receive a bank cheque from someone else he might want to identify him first, for example – by checking his ID. When one member in The Board of Directors in a private company sends an E-mail to his colleague, how does the receiver guarantees it is really him? In this case, digital signature could not be more relevant than ever.

Private key/Public key identification infrastructure

Although Digital signature is not based on a single algorithm, the basics remain the same:

  • Public Key – The known key of the signature owner: It is exposed to the public.
  • Private Key – The secret key of the signature owner. Only he can use it.
  • Hashing – Although not always necessary, it creates an encrypted code of identification.

The basic algorithm works like this: The sender sends the E-mail message digitally signed with his private key and with the recipient’s public key. The recipients, however, clarifies the message with the sender’s public key, and then opens it with his own private key.

Another algorithm is based on hashing, and based on it, the sender can join a hashing code to the message, using the allowed hashing method (in Israel, the officials do not permit hashing less than the SHA2 method), and sign both the message and the hashing with his private key and the recipient’s public key. The recipient, however, clarifies the message with the sender’s public key, and then clarifies with his private key that the hashing code is the same as the origin – which was added by the sender.

Examples of common use in digital signature

  1. Home users – They want to clarify that bills like electricity and property aren’t fishing messages.
  2. Cooperatives – private cooperatives use digital signature for secure customer relations.
  3. Customer Services – The service can be given to the customer without printing papers.
  4. Bureaucracy – Big bureaucratic offices such as regional planning units or ministries of interiors.

Did we encourage your curiosity?

For more information – please apply to Comsign Ltd.

Send us mail


ComsignTrust and the EU Commission on e-Signatures.

We are pleased to announce that ComsignTrust will take part at a two day seminar organized by the European Commission on e-Signatures for e-business transactions Southern Mediterranean Region. The digital signature industry has a major roll in the digital agenda of Europe and we are pleased to take part in establishing the future digital agenda.european-union-logo

The objective

To evaluate the capability to securely access services and to carry secure transactions across EU borders is a keystone of the Digital Agenda for Europe

The wide-spread secure electronic transactions in the region could help to create new partnerships and to increase cooperation opportunities between companies with as a result the improvement of the value chain of sectors concerned, such as IT industries, call centres, textile and clothing, small and medium manufacturers, tourism, agro-food, green technologies, etc.

One of the main objectives of this seminar is to provide conclusions and recommendations for further actions regarding the deployment of e-Signatures.

Expected results and main activities

To develop intra-regional e-business, electronic transactions should work across borders and should be trusted to create confidence between business partners.Confidence depends among others on the reliable identification of transacting parties including new potential partners, the exchange of non-forgettable documents like contracts, invoices or custom documents, or the availability of authenticated websites. An essential instrument to that end is the e-Signatures together with related trusted services. E-business also depend on the availability of efficient electronic services often based on e-Signatures like cross-border electronic public procurement platforms, business portals, administrative process to provide services in another country, electronic payment system.

Our CEO, Mr. Zeev Shetach will take part as one of the keynote speakers at the seminar. Zeev will be presenting on E-Trust services in the Mediterranean.

At the end of the two day seminar we will post Mr.Shetach presentation following some highlights and impressions from the e-Signatures for e-business Seminar.

Written by Chen Furstenberg