About the blog

This blog mainly created for My Cyber law’s assignment, to discuss cyber law cases which happen in Malaysia based on personal opinions, comments and critiques. Those contents, comments and materials posted are for assignment purposes only without profit research, and do not consist any intentionally and bad faith to hurt any parties who may involve, suffer or sensitive to the cases. For those author who is involve in the articles posted, if you found any copyright issue, infringement, please contact me and I shall remove them. Any comments reported as violation, owner of the blog has the right to remove them. Please ignore the date published as the date is just use for softing purposes.

Sunday, April 3, 2011

Post 2: the Digital Signature Act 1997


This act concerns about the secure of electronic communication especially through the internet. Digital Signature is an identity verification using encryption technique to protect against e-mail forgery. In simple, your signature and contents of the email which mostly use in automating signature-dependent processes; approval, agreement, and acceptance must encrypted during send to receive event. Of cause in order to view the encrypted email, the recipient needs to decrypt it with the given key. The Key can be either public key or private key.  

The beauty of this act is to gain confidence across businesses or organizations that needed paperless environment to process e-approval, e-agreement, e-acceptance or even not to disclose PnC (private and confidential) email as the act ensure that the email receive by the recipient is valid. Valid in the sense that the email are true from correspond person or sender.

You can refer to http://www.agc.gov.my/Akta/Vol.%2012/Act%20562.pdf for more information

How the encrypted work?



To do email encrytion, the very beginning is to make sure your email have an add-on encrytion feature.

For an email encrytion, there are 3 components which must be understand during the process

1) Public key - is a key given to everyone who want to send an email to you
2) Passphrase - Your password unlocks your private key and permits it to be used during read and unlock your public key to send and receive encrypted email.
3) Private key - is a key use to kept your secret on your computer since it is used for decryption

The key consist your name, email and password, and it is generated by the software wizard. Your public key must send to a key server so that sender can use it to send encryted email to you. When you receive an encryted email, you will be requested to key in the passphrase to decrypt that email using your private key.


2 comments:

  1. Good post. I am thankful to you for explaining the this digital signature act. After reading this article I have clearly understood the process of encryption. You have discussed all the elements of email encryption. Thanks a lot for this great article.
    electronic signature FAQ

    ReplyDelete