Corporate Blog

Without public key cryptography, it would not be secure to send certain types of data and information over the internet. The internet is an unsecure online environment, which is open to all users. Since the internet is not secure, it is not a good idea to send any type of information to someone else, without using some sort of security. There are different security options available, and one of the more popular choices is using digital certificates.

Public Key Cryptography Uses Digital Certificates Containing a Public Key

The term E signature is short for electronic signature. There a different types of electronic signatures used by businesses and organizations. One type of electronic signature commonly used, is considered a generic signature. A generic signature uses no form of security when it is attached to different types of electronic documents. A good example of a generic signature would be the signature you find at the bottom of email messages.

A E Signature Which Can Encrypt Documents Is Called a Digital Signature

Certification authority uses public key infrastructure to create digital certificates containing public keys for use in the online environment. There is always a pair of digital certificates generated by the CA. One contains the public key, and the other contains the private key. It is vital that you do not get the two digital certificates mixed up, as the private key is not meant to be publically distributed.

You Always Keep the Private Key Created by a Certification Authority

A RSA token is a type of portable device which contains a digital signature used for authentication purposes. The token can be installed onto different types of portable devices, including a USB jump drive and a smart card. There are differences on what types of hardware is required for these devices. A USB jump drive, containing a token, only requires a USB port on the computer. A smart card, on the other hand, requires a smart card reader to be attached to the computer.

Ways to Help Reduce Issues Faced When Using a USB RSA Token

In the virtual world, you need a way to protect your data and information. One solution is to use public key cryptography. This type of digital cryptography requires a pair of keys for encryption and decryption processes. Without the proper key, data is kept locked and secure. The types of keys required depends on whether you are creating the data or verifying the data for authenticity.

Different Situations Where You Can Use Public Key Cryptography

There is an authentication process which takes place, when you use digital certificates to transfer secure information over the internet. The type of authentication used, depends on the information contained in the digital certificate. Your digital certificate could contain either a public key or a private key, but never both. Once you transmit the information, the root certificate uses the public or private key to perform authentication processes. As long as the information passes authentication, it is securely transmitted.

The type of authentication most people are familiar with is single sign on authentication. This type of authentication requires you to enter a user name and password when logging onto a computer. You may also be required to enter your user name and password every time you start a software application, connect to network resources, connect to the internet, or use a virtual private network.

Users May Use the Same User Name and Password with Single Sign on Authentication

There are different methods which you can use to improve the security of single sign on authentication. This type of authentication only requires a user name and password. One method involves using security questions, which only the user would know how to answer. However, if the user forgets their answers, they may not be able to sign on. Also, if questions are common information, it is possible other people could know the answers and gain unauthorized access.

Another Method to Improve Single Sign on Authentication Security

There are certain types of applications where you will want to use two factor authentication. For example, you will want to control who has access to your financial and payroll information. You would not want someone to hack into your payroll system and obtain personal data on your employees. Nor would you want someone to gain access to your financial data. Someone could modify your accounts payable accounts, and route electronic payments directly to their bank account, instead of your creditors.

Single Factor Authentication Is One Part of Two Factor Authentication

Using a PKI certificate helps to ensure information sent over the internet remains secure. There are all sorts of information which you can send, including emails, financial documents, and bill payments. By making sure you information is kept secure, you prevent others from accessing your data. Unfortunately, there are people, who would use your information for their own means, when it is not protected.

Things People Can Do to You When You Do Not Use a PKI Certificate