"Code is the law": how to avoid substitution of the principle of decentralization (part 1)
The history of the Ethereum platform — will the blockchain really open an era of managed self-regulation? The end of winter was marked by the merger of several dozen companies,…

Continue reading →

How Alexander Sysoev tamed Goliath (part 3)
Operating by handles Some part of my team has a fear from time to time that some global service will come and eat us all. This is the fear of…

Continue reading →

How a computer cheats the patent system of "Big Pharma»
The algorithm allowing to find ways of synthesis of pharmacological preparations bypassing patent restrictions is developed. The same program will help to formulate patent applications so as to make them…

Continue reading →


The use of an electronic signature greatly simplifies the process of signing documents and concluding contracts, since it does not require the personal presence of persons concluding various acts. However, despite all the advantages of this technology, there are disadvantages of using an electronic signature.

The relevance of the topic is justified by the widespread introduction of new electronic technologies in everyday life, including the introduction of EDS technology is actively in various government agencies.

Goals, objectives and research methods are to study the technology and identify strengths and weaknesses.

Scientific novelty consists in the approach to the study of the problem from the point of view of technical, legal and organizational security of technology at the current level of development of science and law.

An electronic signature is information in digital form that can be used to identify a natural or legal person without his or her personal presence[1].

In 2001, the draft law “On electronic digital signature” was approved by the Government of the Russian Federation, which was to become a legal basis for ensuring secure electronic document circulation on the Internet.

Purpose of electronic signature

EP is most actively used in the following areas[3]:

office management system in electronic format;
digital trading;
payment system.
The purpose of EP[3]:

allows you to monitor the integrity of the document in electronic form;
provides data protection against tampering and modification;
provides the ability to confirm the authorship of the owner of the EP.
The process of creating the EP includes 2 processes: formation (in this case, the private key is used) and verification of the EP (the public key is used)[3].

Article 5 of the Federal law No. 63-FZ of 06.04.2011 (as amended in 2017) “On electronic signatures” defines the following types of electronic signatures: simple and enhanced electronic signatures. In turn, an enhanced electronic signature is divided into an enhanced unqualified electronic signature (referred to as an unqualified electronic signature) and an enhanced qualified electronic signature (referred to as a qualified electronic signature)[4].

A simple electronic signature (PEP)
It is an electronic signature which, by means of codes, passwords or other means, confirms the formation of an electronic signature by a certain person[4].

PEP is primarily intended for Internet users. Login and password from e-mail or other resource are the data of the probe.

Enhanced unqualified electronic signature (UNEP)
This is an electronic signature, which is a set of encoded characters, which is an analogue of a person’s handwritten signature and is the identifier of his signature[5].

UNEP used in the document as external (incoming to be returned and outgoing documents) and internal (documentation for the turnover inside the enterprise, as well as incoming documents not returnable).

Enhanced qualified electronic signature (UCE))
This is the most secure type of EP; it is the EP, which is created using cryptographic means, confirmed by the competent authorities, that is, the Federal security service of the Russian Federation. A special certificate issued by an accredited certification center serves as a guarantor of the authenticity of the UECP[6].

For OKAP is characterized by a wide range of applications. In addition to the possibility of using when working with the document flow, UECP allows you to work with the portal of public Services, provide reports to the tax authorities, send Bank and similar documents via the Internet, provide reports to extra-budgetary funds, and, in addition, participate in the auction[7].

There are special cryptogramma to work with EP[8]:

CryptoPro CSP
The EP scheme provides for the following processes:

generation of ES keys and keys of check EP;
formation of EP;
check EP.
The mechanism of EP is determined by the implementation of two important processes:

formation of EP;
check EP.
The use of EP allows to perform the following functions in transmission in the system signed with digital signature of the message:

the implementation of integrity control of the transmitted signed with digital signature of the message;
evidentiary identification of the person who signed the communication with the help of EP;
protection of the message against possible forgery.
Hacking EP in practice is a hacking encryption algorithm. To fully protect their data is insufficient protection of the RSA algorithm and the use of mathematical security measures, in other words, the use of a key of sufficient length, because in practice the best result are those attacks that are made on the unprotected stages of key management system RSA[9].

On the basis of an early study of the creation and verification of EP, types of EP, as well as methods of hacking, we can draw the following conclusion about the pros and cons of the use of EP in electronic document management: despite the shortcomings of the EP, we can conclude about the overwhelming number of advantages of its use. Based on this, it can be argued that the use of EP is an effective way of signing documents with the introduction of many areas of electronic document management.

Benefits of working as an online employee
Work on the Internet has become part of specialties and has grown to the volume of individual professions. With the development of IT-technologies, many people just started working only through…


Free simulator for the formation of practical programming skills
Learning programming develops new ways of thinking, gives you the prospect of finding a good job, gives you a sense of superiority and generally makes you cool. There is a…


The most highly paid IT specialists are trained in Moscow and Novosibirsk
According to the study, which was conducted by one of Russia's largest portals for job search Superjob.ru the most highly paid professionals in the field, information technology, prepare four Russian…


Social networking in English language learning. Didactic properties of social networks.
At the moment in the Russian education there is a stage of intensive Informatization of training. Such concept as "lifelong learning" is tightly fixed, which means that learning should not…