Nexus personal Installing Nexus Personal software install

  • Top
  • Security(9)
1. Security instructions for users of ONE FOR ALL smart cards / USB keys

Featured In digital business, the level of security is highly dependent on applying due care and diligence and on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards / USB…

Read more
2. Terminological dictionary

Certification Authority (CA) The CA (an agency for certification) is a legal entity that is authorised to issue digital certificates or provide other services related to authentication and electronic signatures. Certification Practice Statement (CPS) The…

Read more
3. Certification Authority and Registration Authorities

The Certification Authority (CA) plays the central role in the public key infrastructure. It represents an institution that enjoys the trust of all users of digital certificates and signatures. The CA receives requests for issuing digital certificates, performs…

Read more
4. Smart card / USB key

Smart cards / USB keys are at the moment the most secure technology for storing qualified digital certificates. A smart card / USB key is a “small computer” designed using cryptographic circuitry. The private key is safely stored on the card / USB key…

Read more
5. What is the difference between a public and a private key?

Each qualified certificate holder has a pair of keys, the private and the public key. The private key allows the generation of a digital signature that is unique to each holder, while the public key is available to anyone. A document is digitally signed using…

Read more
6. Public key infrastructure

In electronic business, the system for using the security methods based on asymmetric cryptography is called the Public Key Infrastructure (PKI). The PKI is determined by procedures and equipment for: key generation and storage certifying key holders and…

Read more
7. Digital signature security

The level of security depends on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards, whose main advantage is that the private key never leaves the card and the…

Read more
8. Cryptography

Throughout history, cryptography has been dealing with the problem of how to conceal a message from other groups of people. Cryptography or encryption is the process of converting readable text (plaintext) into unreadable text (ciphertext), which is very…

Read more
9. Digital signature

A digital signature basically serves as proof of the identity of the electronic document signer and ensures data integrity and protection against modifying the content of an e-document. Digital signatures are based on asymmetric cryptography, which is why…

Read more
© 2016 Halcom.si - Legal notice & privacy policy
Powered by PROGMBH