e-Sign Glossary
Cryptography Encryption Encryption Key Hash Algorithm – HASH – SHA 256 SSL HSM – Hardware Security Module The HSM component is responsible for: Electronic Signature There is an injective match between the private key and the public key, the authenticator can be absolutely sure that it was signed only by the person who holds the corresponding private key. Secure Electronic Signature Certified Authority (CA) PKI PKI consists of software, communication protocol, information security policy and asymmetric encryption mechanisms that works together to allow multiple users and entities to communicate securely. The difference between PKI and encryption is that encryption technology is actually specifying the algorithm and the key required to encrypt the information, while the PKI is a secure communications infrastructure that defines the required components. Encryption is only part of the infrastructure.
A branch in mathematics and computer science that deals with algorithms for data security on their various layers and consolidates them mathematical.
A way for hiding the meaning of a message by making it unreadable by mathematical functions that makes the message content seems as a sequence of signs referred to as Code. The code is not readable for those who do not hold the appropriate encryption key to restore it to its original state.
The encryption key is the mean to decipher the encryption code. Each encryption key is unique to a specific cipher code.
Cryptographic hash function is a one-way function that converts any length of code or input into a fixed length of output string. Cryptographic hash function is designed so that any change in the input string or code will change significantly the output string.
The hash algorithm function produces a fingerprint string of the file, much smaller than its original size.
The SSL security encryption method is designed for securing web pages. Web pages can only be secure when the encryption between the web pages and the browser is encrypted and the identity of the company or the person presenting the pages is given and can be verified.
A dedicated cryptographic component which is located on the network or connected directly to a dedicated server. The HSM is used as a basis for the PKI infrastructure especially in enterprises.
Electronic signature or Digital Signature is a way for data encryption using a private encryption key. The private key is used for signing and the public key is used to verify the signature.
Electronic signature is considered secure only if it meets the following criteria:
Public Key Infrastructure, the infrastructure that allows intelligent management of public encryption, key distribution and authentication data for users.