My web application needs to have my users’ private keys to sign documents on their behalf. How do I handle that?

Our web application issues governmental documents for our users. Every one of those documents needs to be signed with a private key. However, because our users find it cumbersome to point their browser to their key file every time they wan… Continue reading My web application needs to have my users’ private keys to sign documents on their behalf. How do I handle that?

What CISOs need to understand about document signing

In this Help Net Security video, David King, Director of Innovation at GlobalSign, discusses document signing. Digital signatures utilize advanced cryptographic technology to provide the highest level of security for electronic signatures, surpassing a… Continue reading What CISOs need to understand about document signing

Over what fields is the X509 hash computed over? [duplicate]

Is this how X509 certificates are verified to be valid?

The receiver receives the certificate
Look at the issuer of the cert, and find the public key of that CA (its hardcoded in the application or the OS)
Decrypt the signature using the … Continue reading Over what fields is the X509 hash computed over? [duplicate]

Over what fields is the X509 hash computed over? [duplicate]

Is this how X509 certificates are verified to be valid?

The receiver receives the certificate
Look at the issuer of the cert, and find the public key of that CA (its hardcoded in the application or the OS)
Decrypt the signature using the … Continue reading Over what fields is the X509 hash computed over? [duplicate]

What could be the correct and secure ways to store and manage public keys?

I am developing an open source project(PKDSA) that uses ED25519 and ED448. My purpose of this project was to help others to enable user-secretless based passwordless authentication.
There’re a lot of questions but I will ask them one after… Continue reading What could be the correct and secure ways to store and manage public keys?