07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Certifier, according to different legislation. The CA issues and guarantees the authenticity of<br />

Digital Certificates. A Digital Certificate includes the public key or other information related<br />

to the public key.<br />

- A Registration Authority (RA – English acronym) – validates Digital Certificates requirements.<br />

The RA authorizes the issue of the public key certificate to the requiring individual by the<br />

Certification Authority.<br />

- A certificate management system – a software application provided the PKI vendor.<br />

- A directory where certificates and their public key are stored.<br />

- A Digital Certificate includes the name of the signer and his/her public key, the digital<br />

signature of the Certification Authority that issues the certificate, a series number and the<br />

expiration date.<br />

- Subscribers: the individuals or entities mentioned or identified on the public key certificates,<br />

the holders of private keys corresponding to the public keys of the digital certificates.<br />

- Users: the individuals who validate the integrity and authenticity of a digital document or<br />

data message, based on the signatory digital certificate. (BUGONI, RIVOLTA; 2007), (RIVOLTA;<br />

2008), (RIVOLTA; 2010)<br />

Definition of a digital signature<br />

We are now going to analyze the process of digitally signing an electronic document. In line<br />

with Argentine Law, the process to digitally sign an electronic document has two stages:<br />

- A first step when the subscriber/holder of a digital certificate digitally signs an electronic<br />

document<br />

- A second step when a third party, the receiver of that digitally signed electronic document<br />

checks for the message authorship and integrity.<br />

Digital signatures are an important application of this public key technology. In effect, the<br />

individual who sends a message uses his/her private key to encrypt the secure message digest<br />

(obtained through the calculation of the message hash function). That individual sends the<br />

encrypted digest and its digital certificate which has the public key. El receiver decrypts the<br />

digest using the sender’s public key, which matches the private key of it. The receiver of the<br />

message checks the digital signature of that message, for which recalculates its hash function,<br />

and if both match checks that the message has not been tampered with, process through which<br />

the receiver has certainty of its integrity. If the receiver could decrypt the digest by means of<br />

the public key corresponding to the sender of the message, the receiver checks the authorship<br />

of the digitally signed electronic document. (BUGONI, RIVOLTA; 2007), (RIVOLTA; 2008),<br />

(RIVOLTA; 2010)<br />

Technological Standards<br />

The same as in other environments, public key technologies are supported on standards. As<br />

public key initiatives and infrastructures increase in number, modifications to the standards<br />

initially used have to be implemented to enlarge their functionality or to make them more<br />

BIOMETRICS 2 485

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!