A collection of cryptographic articles and resources

Digital authentication - factors, mechanisms and schemes

05. January 2017 by Luis Balbas (guest)

Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be." Similarly, digital authentication is about having suitably secure mechanisms in place to be able to confirm whether an individual or online user is who they say they are.

This article gives a comprehensive insight into digital authentication and the IT-enabled processes and architectures needed.

Read More

US Court Rejects DocuSign E-Signatures as method to provide Digital Authorization

15. December 2016 by Heather Walker and Stefan Hansen

An interesting case rose in the state of California this year regarding a bankruptcy lawyer who utilized DocuSign for many official legal documents. Paul Bains, the lawyer who leveraged DocuSign for bankruptcy petitions and other important matters, used the software in place of original signatures as is done in many commercial settings in the US and globally. Judge Robert Bardwil of the U.S. Bankruptcy court in California ruled that while DocuSign is appropriate in many business settings, overall it does not constitute as a replacement for original signatures on legal documents and the like.

Read More

Strong authentication for Governments through trust service providers - a European perspective

09. December 2016 by Dawn M. Turner (guest)

One of the greatest benefits of the digital age is the availability of being able to perform many different government processes online in a shorter amount of time versus having to depend upon the postal service or taking time out of a busy day to go stand in a line at a government office. However, when dealing with sensitive documents over the Internet, such as identification papers, travel documents or health records, certain precautions need to be in place. With identity fraud on the rise, it is imperative to ensure the integrity of important documents, in addition to providing assurance that the signatory or person gaining access to personal information is who they say they are. This is why strong authentication that can be provided through trust service providers is now required for many processes.

Read More

Digital signatures in mobile banking and payment processing

10. November 2016 by Heather Walker (guest)

Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and activity from the internet and bank-specific applications. Not too far down the road, we were able to deposit mobile checks without having to run into brick and mortar locations. Fast forward to two years ago and we saw the rise of Apple Pay and their competitors; now we can make purchases using our smart phones in place of a credit card.

Read More

How eIDAS affects the USA

09. November 2016 by Heather Walker (guest)

On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built with the intent to encourage the adoption of electronic signatures, and provide a legal framework by which member states could implement for consistency. Furthermore, the EU came out with a new strategy called "Digital Single Market”, which was to drive e-commerce across the EU and globally. The directive was found to hamper the efforts for the digital single market, and thus in 2014 it was announced that eIDAS would eventually take it’s place.

Read More