Digital Signatures, Timestamps etc

Most computer systems are far from being secure.
A lack of security - it is said - might hinder the developments of new information technologies. Everybody knows electronic transactions involve a more or less calculated risk. Rumors about insecurity let consumers doubt whether the commodity of e-commerce is bigger or its risks. First of all the market depends on the consumer's confidence. To provide that another application for public key cryptography gets essential: the digital signature, which is used to verify the authenticity of the sender of certain data.
It is done with a special private key, and the public key is verifying the signature. This is especially important if the involved parties do not know one another. The DSA (= Digital Signature Algorithm) is a public-key system which is only able to sign digitally, not to encrypt messages. In fact digital signature is the main-tool of cryptography in the private sector.

Digital signatures need to be given for safe electronic payment. It is a way to protect the confidentiality of the sent data, which of course could be provided by other ways of cryptography as well. Other security methods in this respect are still in development, like digital money (similar to credit cards or checks) or digital cash, a system that wants to be anonymous like cash, an idea not favored by governments as it provides many opportunities for money laundry and illegal transactions.

If intellectual property needs to be protected, a digital signature, together with a digital timestamp is regarded as an efficient tool.

In this context, the difference between identification and authentication is essential. In this context smartcards and firewalls are relevant, too.

A lot of digital transactions demand for passwords. More reliable for authentication are biometric identifiers, full of individual and unrepeatable codes, signatures that can hardly be forged.

For more terms of cryptography and more information see:
http://poseidon.csd.auth.gr/signatures
http://www.dlib.org/dlib/december97/ibm/12lotspiech.html
http://www.cryptography.com/technology/technology.html
http://www.cdt.org/crypto/glossary.shtml
http://www.oecd.org//dsti/sti/it/secur/prod/GD97-204.htm

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611776/100438659015
 
The Concept of the Public Sphere

According to social critic and philosopher Jürgen Habermas "public sphere" first of all means "... a domain of our social life in which such a thing as public opinion can be formed. Access to the public sphere is open in principle to all citizens. A portion of the public sphere is constituted in every conversation in which private persons come together to form a public. They are then acting neither as business or professional people conducting their private affairs, nor as legal consociates subject to the legal regulations of a state bureaucracy and obligated to obedience. Citizens act as a public when they deal with matters of general interest without being subject to coercion; thus with the guarantee that they may assemble and unite freely, and express and publicize their opinions freely."

The system of the public sphere is extremely complex, consisting of spatial and communicational publics of different sizes, which can overlap, exclude and cover, but also mutually influence each other. Public sphere is not something that just happens, but also produced through social norms and rules, and channeled via the construction of spaces and the media. In the ideal situation the public sphere is transparent and accessible for all citizens, issues and opinions. For democratic societies the public sphere constitutes an extremely important element within the process of public opinion formation.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611734/100438658403
 
1996 WIPO Copyright Treaty (WCT)

The 1996 WIPO Copyright Treaty, which focused on taking steps to protect copyright "in the digital age" among other provisions 1) makes clear that computer programs are protected as literary works, 2) the contracting parties must protect databases that constitute intellectual creations, 3) affords authors with the new right of making their works "available to the public", 4) gives authors the exclusive right to authorize "any communication to the public of their works, by wire or wireless means ... in such a way that members of the public may access these works from a place and at a time individually chosen by them." and 5) requires the contracting states to protect anti-copying technology and copyright management information that is embedded in any work covered by the treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm



http://www.wipo.int/documents/en/diplconf/dis...
INDEXCARD, 1/1