Cryptography: A study on the legal position of symmetric and asymmetric encryption under the Malaysian digital signature act 1997

Electronic commerce involves the exchange of goods and services for some form of money in the virtual world without the involvement of face-to-face communication. For that reason, the security of electronic payment system is very crucial for the success and widespread acceptance of such online t...

Full description

Saved in:
Bibliographic Details
Main Authors: Nazli, Ismail@Nawang, Aminuddin, MUstaffa, Mohd Lotpi, Mohd Yusob
Format: Conference or Workshop Item
Language:English
Published: 2015
Subjects:
Online Access:http://eprints.unisza.edu.my/630/1/FH03-FLAIR-16-04814.pdf
http://eprints.unisza.edu.my/630/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Electronic commerce involves the exchange of goods and services for some form of money in the virtual world without the involvement of face-to-face communication. For that reason, the security of electronic payment system is very crucial for the success and widespread acceptance of such online transactions. Over the past few years, technological developments have made significant contributions to secure the electronic payment system from theft and manipulation by interlopers and eavesdroppers. One way to have secure transmissions of the transaction information between the contracting parties is the adoption of cryptography. Cryptography refers to the art and science of keeping information secret by using a code or cipher. It can be an effective tool for the secure use of information and communication technology by ensuring confidentiality, integrity and availability of data and by providing authentication and non-repudiation mechanisms for that data. And this technology has been primarily employed by providers of electronic and digital signatures in online transactions. Due to the importance of cryptography, it is therefore pertinent in this study to explore in details the technical aspects of cryptography and its classification into symmetric (secret key) cryptography and asymmetric (public key) encryption. The study will then examine the legal position of symmetric and asymmetric encryption under the Digital Signature Act 1997 (the DSA) and highlight any loopholes or lacunae in the DSA.