SlideShare a Scribd company logo
Page 1




User-Friendly Digital Signatures
           Jon Matonis, CEO, Hush Communications




             Digital Identity Forum
                 October 17 & 18th 2000
                    Marlborough Hotel
                       London, UK



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                          Page 2




                    Overview

• Digital Signatures & the Market
• What are Digital Signatures ?
• Signatures v. Certificates
• Complex PKI Deployments
• The Hush Communications Solution: Technology
• The Hush Communications Solution: Trust
• Contact Hush



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    1
Page 3




 Digital Signatures & the Market

    • Until recently, digital signatures were not
      considered legally binding within the United
      States;
    • Europe has been quicker to adopt digital
      signatures as a replacement for the traditional
      written signature;
    • Touted as the link between consumers and e-
       commerce, digital signatures are an emerging
       technology poised to generate significantly larger
       transaction sizes.
                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                        Page 4




       What are Digital Signatures ?

• Digital signatures verify with mathematical
  certainty that the message, document, or
  other media received originated from the
  anticipated sender (authentication);
• Digital signatures ensure that what you send
  over the Internet is exactly what is received at
  the other end (integrity);

                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                                  2
Page 5




       What are Digital Signatures ?

• Digital signatures ensure that someone
  cannot deny that they authorized a particular
  transaction (non-repudiation);
• There are multiple ways to create digital
  signatures, including biometrics, like face
  printing and retina scans, but the most
  common methods involve cryptographic
  algorithms and protocols.
                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                   Page 6




          Signatures v. Certificates

• A digital signature is created by encrypting
  data with a private key.
• A digital certificate is a public key that is
  digitally signed by a Certificate Authority (CA).




                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                             3
Page 7




         Complex PKI Deployments

• Issuing a digital certificate can cost anywhere
  from $5 to $10 per customer.
• The enterprise software needed to manage the
  key, which decrypts and encrypts a message, can
  cost as much as $10 to $100 a person.
• Consumers must pay a periodic fee for the use of
  a digital certificate.
• Most signing devices are linked to a particular PC
  or network.
                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                     Page 8




         Complex PKI Deployments

• The private portion of the digital identity must
  be accessible exclusively to the owner and
  must be used to decrypt and sign data.
• Most PKI solutions require that the user
  possess their private key, which is inherently
  unsafe and reliant upon properly configured
  hardware.

                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                               4
Page 9




         Complex PKI Deployments

• PKI-based digital certificates are inefficient
  and cumbersome where a certificate is
  required to authenticate an individual user.
• Traditional PKI doesn’t have roaming
  capability.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 10




   The Hush Communications Solution

  The Hush Encryption Engine ā„¢ allows end-
  users to store their private key on a Hush
  server. The user doesn’t have to carry a
  private key, smart card, or store the key on a
  hard drive. However, even though Hush
  manages the private key, it is always
  encrypted and is inaccessible to anyone at
  Hush or elsewhere.
                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              5
Page 11




   The Hush Communications Solution

• The Hush Encryption Engine ā„¢ ensures that
  no one but you can access your private key.
• The Engine doesn’t tie you to a single
  computer.
• The Engine is compatible with multiple online
  applications.
• The Engine works with the Java ā„¢
  technology in most common Web browsers.                       October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 12




               Hush Technology

• Hush users generate their private key on their own
  computer first, during signup of installation, and
  encrypt it with a passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 6
Page 13




                Hush Technology

• And then, upload the encrypted private key to one of
  the Hush servers.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 14




                Hush Technology

• After that, whenever a user starts a secure
  communications session, the private key
  automatically is retrieved from the server.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 7
Page 15




                Hush Technology

• And finally, decrypted with the user’s passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 16




      IMPORTANT SECURITY NOTE

• When the private key resides on a Hush key
  server, it is encrypted with a passphrase.
  That passphrase NEVER leaves the user’s
  computer. At no point is the private key or any
  private data accessible to anyone at Hush.
  Even if Hush were to be subpoenaed, we
  would not be able to learn or reveal your
  private key.
                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 8
Page 17




           Hush Digital Signatures

• Hush offers its users the option to digitally
  sign their email and attachments.
• Hush’s digital signature feature is a method
  for the individual user to authenticate their
  online identity.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 18




                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              9
Page 19




                     October 23, 00
Copyright 2000 Hush Communications




                           Page 20




                     October 23, 00
Copyright 2000 Hush Communications




                                      10
Page 21




   Sending a Digitally Signed Message

• First, the data is signed with the user’s private key,
  which the user retrieved at the start of the session,
  when the user logs in with their passphrase.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 22




       Signed Message is Transmitted

• Then, the signed data is sent on to its final
  destination.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    11
Page 23




   Verifying a Digitally Signed Message

• First, the signed data arrives at the recipient’s
  computer.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 24




   Verifying a Digitally Signed Message

• Then, the sender’s public key is automatically
  retrieved from a Hush key server.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    12
Page 25




   Verifying a Digitally Signed Message

• Finally, the public key is used to verify the
  authenticity and integrity of the data.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 26




    The Hush Communications Solution

• Hush offers Private Label services as a way
  for leading companies to brand their secure
  messaging.
• Trusted Private Label partners control the
  registration and revocation process.
• Digital signatures are enforced and backed
  up by the policies of the Private Label
  partner.                                                         October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    13
Page 27




 Contact Hush Communications

Worldwide                Sales & Business
Headquarters             Development Office
Hush Communications      Hush Communications
22 Upper Pembroke St.    2825 E. Cottonwood
Dublin 2, Ireland        Parkway, Ste. 500
Phone +353-1-241-0303    Salt Lake City, UT 84121
Fax    +353-1-241-0370   Phone +801-990-3490
alliances@hushmail.com   Fax   +801-990-3111
                         sales@hushmail.com


                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              14

More Related Content

PPTX
Drm digital rights managment-june2014-tarek gaber
Tarek Gaber
Ā 
PPT
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
Ā 
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
Ā 
PPTX
Blockchain
Zefren Edior
Ā 
PPTX
3.5 Online Services and Security and Privacy of Data
Momina Mateen
Ā 
PPTX
Digital signature by mohsin iftikhar
Mohsin Ali
Ā 
PPTX
3.1 Online Services (Part 1)
Momina Mateen
Ā 
PPTX
What is bitcoin?
Suraj Bora
Ā 
Drm digital rights managment-june2014-tarek gaber
Tarek Gaber
Ā 
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
Ā 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
Ā 
Blockchain
Zefren Edior
Ā 
3.5 Online Services and Security and Privacy of Data
Momina Mateen
Ā 
Digital signature by mohsin iftikhar
Mohsin Ali
Ā 
3.1 Online Services (Part 1)
Momina Mateen
Ā 
What is bitcoin?
Suraj Bora
Ā 

What's hot (19)

DOC
Technical seminar
10e11a0545
Ā 
PDF
Navigating the World of Cloud Computing
Online Tech
Ā 
PDF
Presentazione
databeatpick
Ā 
PPSX
It act
Yogesh Thawait
Ā 
PPTX
Electronic signature
Sonu Mishra
Ā 
PPTX
Introduction to blockchain
Aniket Singh
Ā 
DOC
Chapter 06 Information Technology Act 2000
Robin Kapoor
Ā 
PPTX
Moldova kick starting effective digitisation v104 shamah
moldovaictsummit
Ā 
PPTX
Digital Cash Overview
Osama M. Khaled
Ā 
PDF
Mobile Financial Services
USAID CEED II Project Moldova
Ā 
PDF
CubeIQ | SID banknotes deposit
Andreas Papadedes
Ā 
PPTX
Digital Signatures
Dr. Prashant Vats
Ā 
PDF
20150522_Woobe_Information Kit_Light
Vincent Lebunetel
Ā 
PPT
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
Ā 
PPTX
The use cases of blockchain technology
Ugokwe Marcellus Ifeanyi
Ā 
PDF
Future of digital identity initial perspective - final lr
Future Agenda
Ā 
PDF
Blockchain presentation v0617
Joaquim Pedro Antunes
Ā 
PPTX
E-Signature Vs. Digital Signature
Mahmoud Ezzat
Ā 
Technical seminar
10e11a0545
Ā 
Navigating the World of Cloud Computing
Online Tech
Ā 
Presentazione
databeatpick
Ā 
It act
Yogesh Thawait
Ā 
Electronic signature
Sonu Mishra
Ā 
Introduction to blockchain
Aniket Singh
Ā 
Chapter 06 Information Technology Act 2000
Robin Kapoor
Ā 
Moldova kick starting effective digitisation v104 shamah
moldovaictsummit
Ā 
Digital Cash Overview
Osama M. Khaled
Ā 
Mobile Financial Services
USAID CEED II Project Moldova
Ā 
CubeIQ | SID banknotes deposit
Andreas Papadedes
Ā 
Digital Signatures
Dr. Prashant Vats
Ā 
20150522_Woobe_Information Kit_Light
Vincent Lebunetel
Ā 
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
Ā 
The use cases of blockchain technology
Ugokwe Marcellus Ifeanyi
Ā 
Future of digital identity initial perspective - final lr
Future Agenda
Ā 
Blockchain presentation v0617
Joaquim Pedro Antunes
Ā 
E-Signature Vs. Digital Signature
Mahmoud Ezzat
Ā 
Ad

Similar to User-Friendly Digital Signatures (20)

PPTX
Public key infrastructure
Aditya Nama
Ā 
PPT
Digital Signiture
Vikesh Bawane
Ā 
PDF
Wisekey italia presentation 2012
K-Team Consulting Srl
Ā 
PPTX
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
DocuSign
Ā 
PPT
Digital signature
AJAL A J
Ā 
PPTX
Public Digital Identity as a Service
PT Datacomm Diangraha
Ā 
PPTX
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
lucycse
Ā 
PPTX
The VDI InfoSec Conundrum
VirtualTal
Ā 
PDF
Cryptointro
losalamos
Ā 
PPTX
Digital signatur
Ruwandi Madhunamali
Ā 
PPTX
Ppt
Nidhi Bansal
Ā 
PPT
Online bankingsecurity
Mohammad Akteruzzaman(Nannu)
Ā 
DOCX
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Signer.Digital
Ā 
PDF
Rsa Secur Id From Signify
kate_holden
Ā 
PDF
Rsa Secur Id From Signify
pjpallen
Ā 
PDF
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
Ā 
PPT
Digital Signature
Mohamed Talaat
Ā 
PDF
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
Ā 
PDF
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
Ā 
Public key infrastructure
Aditya Nama
Ā 
Digital Signiture
Vikesh Bawane
Ā 
Wisekey italia presentation 2012
K-Team Consulting Srl
Ā 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
DocuSign
Ā 
Digital signature
AJAL A J
Ā 
Public Digital Identity as a Service
PT Datacomm Diangraha
Ā 
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
lucycse
Ā 
The VDI InfoSec Conundrum
VirtualTal
Ā 
Cryptointro
losalamos
Ā 
Digital signatur
Ruwandi Madhunamali
Ā 
Online bankingsecurity
Mohammad Akteruzzaman(Nannu)
Ā 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Signer.Digital
Ā 
Rsa Secur Id From Signify
kate_holden
Ā 
Rsa Secur Id From Signify
pjpallen
Ā 
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
Ā 
Digital Signature
Mohamed Talaat
Ā 
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
Ā 
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
Ā 
Ad

More from Jon Matonis (20)

PDF
Anarchy and Money (Institute for Monetary Freedom, 1984)
Jon Matonis
Ā 
PPTX
eCom21: Bitcoin exchanges state of the market 2015
Jon Matonis
Ā 
DOCX
Booz Allen Hamilton Money Unbound 2015
Jon Matonis
Ā 
PDF
Family Office Forum Zurich 2014
Jon Matonis
Ā 
DOCX
Society for the Study of Gambling 20 Jan 2015
Jon Matonis
Ā 
PDF
EuroFinance Miami 2015
Jon Matonis
Ā 
PDF
EuroFinance Singapore 2015
Jon Matonis
Ā 
PDF
EuroFinance Budapest 2014
Jon Matonis
Ā 
PPTX
Amplify 2015
Jon Matonis
Ā 
PPTX
State of the Market: Bitcoin in Gambling
Jon Matonis
Ā 
PPT
BAFT
Jon Matonis
Ā 
PPT
Login 2014 Vilnius
Jon Matonis
Ā 
PPT
The Appeal of a Nonpolitical Currency
Jon Matonis
Ā 
PPT
Bitcoin in the iGaming Environment
Jon Matonis
Ā 
PPT
Bitcoin: Cash Becoming Digital
Jon Matonis
Ā 
PPT
The Evolution of e-Money (DeepSec)
Jon Matonis
Ā 
PPT
The Evolution of E-Money
Jon Matonis
Ā 
PDF
MileMoney, Inc. - The People's Currency
Jon Matonis
Ā 
PDF
PayPal Still Dominates Online Payment Industry - ppg 4-5
Jon Matonis
Ā 
PDF
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
Jon Matonis
Ā 
Anarchy and Money (Institute for Monetary Freedom, 1984)
Jon Matonis
Ā 
eCom21: Bitcoin exchanges state of the market 2015
Jon Matonis
Ā 
Booz Allen Hamilton Money Unbound 2015
Jon Matonis
Ā 
Family Office Forum Zurich 2014
Jon Matonis
Ā 
Society for the Study of Gambling 20 Jan 2015
Jon Matonis
Ā 
EuroFinance Miami 2015
Jon Matonis
Ā 
EuroFinance Singapore 2015
Jon Matonis
Ā 
EuroFinance Budapest 2014
Jon Matonis
Ā 
Amplify 2015
Jon Matonis
Ā 
State of the Market: Bitcoin in Gambling
Jon Matonis
Ā 
BAFT
Jon Matonis
Ā 
Login 2014 Vilnius
Jon Matonis
Ā 
The Appeal of a Nonpolitical Currency
Jon Matonis
Ā 
Bitcoin in the iGaming Environment
Jon Matonis
Ā 
Bitcoin: Cash Becoming Digital
Jon Matonis
Ā 
The Evolution of e-Money (DeepSec)
Jon Matonis
Ā 
The Evolution of E-Money
Jon Matonis
Ā 
MileMoney, Inc. - The People's Currency
Jon Matonis
Ā 
PayPal Still Dominates Online Payment Industry - ppg 4-5
Jon Matonis
Ā 
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
Jon Matonis
Ā 

Recently uploaded (20)

PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
Ā 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
Ā 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
Ā 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
Ā 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
Ā 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
Ā 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
Ā 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
Ā 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
Ā 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
Ā 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
Ā 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
Ā 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
Ā 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
Ā 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
Ā 
PDF
Software Development Methodologies in 2025
KodekX
Ā 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
Ā 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
Ā 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
Ā 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
Ā 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
Ā 
The Future of AI & Machine Learning.pptx
pritsen4700
Ā 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
Ā 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
Ā 
Simple and concise overview about Quantum computing..pptx
mughal641
Ā 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
Ā 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
Ā 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
Ā 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
Ā 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
Ā 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
Ā 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
Ā 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
Ā 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
Ā 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
Ā 
Software Development Methodologies in 2025
KodekX
Ā 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
Ā 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
Ā 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
Ā 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
Ā 

User-Friendly Digital Signatures

  • 1. Page 1 User-Friendly Digital Signatures Jon Matonis, CEO, Hush Communications Digital Identity Forum October 17 & 18th 2000 Marlborough Hotel London, UK October 23, 00 Copyright 2000 Hush Communications Page 2 Overview • Digital Signatures & the Market • What are Digital Signatures ? • Signatures v. Certificates • Complex PKI Deployments • The Hush Communications Solution: Technology • The Hush Communications Solution: Trust • Contact Hush October 23, 00 Copyright 2000 Hush Communications 1
  • 2. Page 3 Digital Signatures & the Market • Until recently, digital signatures were not considered legally binding within the United States; • Europe has been quicker to adopt digital signatures as a replacement for the traditional written signature; • Touted as the link between consumers and e- commerce, digital signatures are an emerging technology poised to generate significantly larger transaction sizes. October 23, 00 Copyright 2000 Hush Communications Page 4 What are Digital Signatures ? • Digital signatures verify with mathematical certainty that the message, document, or other media received originated from the anticipated sender (authentication); • Digital signatures ensure that what you send over the Internet is exactly what is received at the other end (integrity); October 23, 00 Copyright 2000 Hush Communications 2
  • 3. Page 5 What are Digital Signatures ? • Digital signatures ensure that someone cannot deny that they authorized a particular transaction (non-repudiation); • There are multiple ways to create digital signatures, including biometrics, like face printing and retina scans, but the most common methods involve cryptographic algorithms and protocols. October 23, 00 Copyright 2000 Hush Communications Page 6 Signatures v. Certificates • A digital signature is created by encrypting data with a private key. • A digital certificate is a public key that is digitally signed by a Certificate Authority (CA). October 23, 00 Copyright 2000 Hush Communications 3
  • 4. Page 7 Complex PKI Deployments • Issuing a digital certificate can cost anywhere from $5 to $10 per customer. • The enterprise software needed to manage the key, which decrypts and encrypts a message, can cost as much as $10 to $100 a person. • Consumers must pay a periodic fee for the use of a digital certificate. • Most signing devices are linked to a particular PC or network. October 23, 00 Copyright 2000 Hush Communications Page 8 Complex PKI Deployments • The private portion of the digital identity must be accessible exclusively to the owner and must be used to decrypt and sign data. • Most PKI solutions require that the user possess their private key, which is inherently unsafe and reliant upon properly configured hardware. October 23, 00 Copyright 2000 Hush Communications 4
  • 5. Page 9 Complex PKI Deployments • PKI-based digital certificates are inefficient and cumbersome where a certificate is required to authenticate an individual user. • Traditional PKI doesn’t have roaming capability. October 23, 00 Copyright 2000 Hush Communications Page 10 The Hush Communications Solution The Hush Encryption Engine ā„¢ allows end- users to store their private key on a Hush server. The user doesn’t have to carry a private key, smart card, or store the key on a hard drive. However, even though Hush manages the private key, it is always encrypted and is inaccessible to anyone at Hush or elsewhere. October 23, 00 Copyright 2000 Hush Communications 5
  • 6. Page 11 The Hush Communications Solution • The Hush Encryption Engine ā„¢ ensures that no one but you can access your private key. • The Engine doesn’t tie you to a single computer. • The Engine is compatible with multiple online applications. • The Engine works with the Java ā„¢ technology in most common Web browsers. October 23, 00 Copyright 2000 Hush Communications Page 12 Hush Technology • Hush users generate their private key on their own computer first, during signup of installation, and encrypt it with a passphrase. October 23, 00 Copyright 2000 Hush Communications 6
  • 7. Page 13 Hush Technology • And then, upload the encrypted private key to one of the Hush servers. October 23, 00 Copyright 2000 Hush Communications Page 14 Hush Technology • After that, whenever a user starts a secure communications session, the private key automatically is retrieved from the server. October 23, 00 Copyright 2000 Hush Communications 7
  • 8. Page 15 Hush Technology • And finally, decrypted with the user’s passphrase. October 23, 00 Copyright 2000 Hush Communications Page 16 IMPORTANT SECURITY NOTE • When the private key resides on a Hush key server, it is encrypted with a passphrase. That passphrase NEVER leaves the user’s computer. At no point is the private key or any private data accessible to anyone at Hush. Even if Hush were to be subpoenaed, we would not be able to learn or reveal your private key. October 23, 00 Copyright 2000 Hush Communications 8
  • 9. Page 17 Hush Digital Signatures • Hush offers its users the option to digitally sign their email and attachments. • Hush’s digital signature feature is a method for the individual user to authenticate their online identity. October 23, 00 Copyright 2000 Hush Communications Page 18 October 23, 00 Copyright 2000 Hush Communications 9
  • 10. Page 19 October 23, 00 Copyright 2000 Hush Communications Page 20 October 23, 00 Copyright 2000 Hush Communications 10
  • 11. Page 21 Sending a Digitally Signed Message • First, the data is signed with the user’s private key, which the user retrieved at the start of the session, when the user logs in with their passphrase. October 23, 00 Copyright 2000 Hush Communications Page 22 Signed Message is Transmitted • Then, the signed data is sent on to its final destination. October 23, 00 Copyright 2000 Hush Communications 11
  • 12. Page 23 Verifying a Digitally Signed Message • First, the signed data arrives at the recipient’s computer. October 23, 00 Copyright 2000 Hush Communications Page 24 Verifying a Digitally Signed Message • Then, the sender’s public key is automatically retrieved from a Hush key server. October 23, 00 Copyright 2000 Hush Communications 12
  • 13. Page 25 Verifying a Digitally Signed Message • Finally, the public key is used to verify the authenticity and integrity of the data. October 23, 00 Copyright 2000 Hush Communications Page 26 The Hush Communications Solution • Hush offers Private Label services as a way for leading companies to brand their secure messaging. • Trusted Private Label partners control the registration and revocation process. • Digital signatures are enforced and backed up by the policies of the Private Label partner. October 23, 00 Copyright 2000 Hush Communications 13
  • 14. Page 27 Contact Hush Communications Worldwide Sales & Business Headquarters Development Office Hush Communications Hush Communications 22 Upper Pembroke St. 2825 E. Cottonwood Dublin 2, Ireland Parkway, Ste. 500 Phone +353-1-241-0303 Salt Lake City, UT 84121 Fax +353-1-241-0370 Phone +801-990-3490 [email protected] Fax +801-990-3111 [email protected] October 23, 00 Copyright 2000 Hush Communications 14