Problems of Digital Sustainability
Total Page:16
File Type:pdf, Size:1020Kb
Acta Polytechnica Hungarica Vol. 7, No. 3, 2010 Problems of Digital Sustainability Tamás Szádeczky Department of Measurement and Automation, Kandó Kálmán Faculty of Electrical Engineering, Óbuda University Tavaszmező u. 17, H-1084 Budapest, Hungary [email protected] Abstract: The article introduces digital communication by drawing comparisons between the histories of digital and conventional written communication. It also shows the technical and legal bases and the currently reached achievements. In relation to the technical elements, it acquaints the reader with the development and current effects of computer technology, especially cryptography. In connection with the legal basis, the work presents the regulations which have emerged and made possible the legal acceptance of the digital signature and electronic documents in the United States of America, in the European Union and among certain of its member countries, including Hungary. The article reviews the regulations and the developed practices in the fields of e-commerce, electronic invoices, electronic records management and certain e-government functions in Hungary which are necessary for digital communication. The work draws attention to the importance of secure keeping and processing of electronic documents, which is also enforced by the legal environment. The author points to the technical requirements and practical troubles of digital communication, called digital sustainability. Keywords: electronic archive; digital sustainability; preservation; electronic signature; data security 1 Introduction We may distinguish three revolutions in the development of written communication [1]. The first revolution was the invention of alphabetical writing carrying phonetic value around 1300 BC., which segregated the text from the content. The second revolution in the 15th Century was the book printing invented by Gutenberg, Johannes Gensfleisch, which made written material widely available. The third revolution – which is called the digital revolution – is currently going on. We cannot accurately define its nature without an historical overview, but we may declare that it has modified all of the essential structures of written communication. At the same time, however, it has kept all the achievements of the previous revolutions. This is the key to digital culture and to the information society. – 123 – T. Szádeczky Problems of Digital Sustainability With the development of digital communication, computers conquered space in the area of applications which traditionally used paper. We can consider records management, accountancy and generally the creation of the public documents, notary documents and simple contracts as those applications. The necessary technical conditions have existed since the 1990s, when the technology of encryption with an asymmetric key was worked out in detail, in addition to computer and network technologies. First this development made creating electronic signature possible, and then came the acceptance of defining the legal consequences. We may solve electronic authentication of documents by electronic signature in the international practice and in Hungarian legal requirements. In the European Union and in the Republic of Hungary there are at present political and legislative endeavours aimed at rapid development in these areas. The problems of this process are referred to as the issue of digital sustainability [2]. The basic question of this research is: What is the difference between conventional and digital communication, especially as regards the long-term storage and usage of electronic documents. The research question was analysed via observation, information gathering and empirical statements based on the personal professional practice of the author. 2 Conditions of the Development of Digital Communication The technical requirements necessary for the development of digital communication can be divided into three parts: computer technology, networking technology and data security procedures, providing a practical equivalent to the requirements of traditional written communication. The first Turing-complete digital computer, the Zuse Z3, was constructed by Zuse Konrad in 1941. The creation of the transistor in 1947 revolutionized the world of crude electromechanical computers [3]. The integrated circuit, a mass of transistors fixed onto a single sheet, was developed in 1958. The first personal computer (the IBM PC) appeared in 1981, making it possible for home and office users to have computational performance. This was a huge invention compared to the usage of time slices in computer centres earlier. The development of computer networks started in 1962, when the Advanced Research Projects Agency (ARPA) set up a research team called the Intergalactic Network, a group of which developed the time-sharing system. This system made possible the sharing of a mainframe computers’ services between numerous users on a telex network [4]. – 124 – Acta Polytechnica Hungarica Vol. 7, No. 3, 2010 In 1969 a research team of ARPA created the first packet switched computer network, the ARPANET. This network connected only a couple of universities and military systems at that time. It was not until the end of the 1970s that the civilian and broad usage of the network was in sight, but already at this time rapid enlargement had started. ARPANET was interlinked with NSFNet during the late 1980s, and the term ‘Internet’ was used as the name of the new network, which has since become the large and global TCP/IP network. According to the World Internet Project 2007, 49 percent of Hungarian households (about two million) owned a personal computer at home, and the third of these computers (35%) also had an internet connection [5]. There is another significant requirement – but one which generally receives lesser emphasis – in connection with the development of digital communication: human resources. This means inclination and ability of citizens and clients to use the developments in digital communication and to actively participation in the information society. Because of the limited nature of this paper, the human resources and the economical aspect are beyond its. In the following parts of the chapter, the development of the data security procedures and the legal-political conditions will be outlined, because of their emphasized significance in the present approach to the topic. 2.1 Data Security Procedures The development and free public usage of data security procedures ensure a connection between the requirements of written communication and those of digital communication. It is necessary to ensure confidentiality, authenticity and originality in order to achieve the logic safety of electronic data. We accomplish this with mathematical methods, which cryptography (science of encryption) deals with. The encryption of information is practically the same age as writing, because since we started writing messages on paper (or on clay tablets) we have wanted others to be unable to read it. Modern cryptosystems are wholly based on mathematical encryption methods, made by computers, which were developed at the end of twentieth century. There are two kinds of encryption methods: symmetric and asymmetric. The primary difference between the two is that the same key is used for encryption and decryption in the case of the symmetric one (this method is called single key because of this), while we perform the encryption and decryption processes with two different keys in the case of the asymmetric one (the two key method). The modern computer-based symmetric encryption was developed in the 1970s. It applies reversible functions on blocks (generally 64-256 bits) by mixing and replacing characters or blocks of the clear text. In this method, it is possible to attain a good security level with the combination and numerous repeating of relatively simple procedures [6]. A popular symmetric cryptosystem of this kind is – 125 – T. Szádeczky Problems of Digital Sustainability the Data Encryption Standard (DES). While it is today insecure because of its short key length (56 bits), it is nevertheless occasionally used. As a result of break competitions on DES1 we can state that any confidential message encrypted by DES is breakable in minutes with the appropriate hardware. From the principle of symmetric encryption (in civilian use) the cyphertext is breakable in all cases; it depends only on time.2 Due to Kerckhoffs' principle, the security of encryption depends only on quality of the applied mathematical algorithm and the length of key, and thus not on the secrecy of the algorithm. Despite this, in individual cases, in the interest of increasing security (DES) or due to reasons of intellectual property (IDEA), the algorithm may be secret. Nowadays the Advanced Encryption Standard (AES) is used more often than anything else. AES, developed in the 2000s, uses 128-256 bits of key length and is hopefully based on an appropriate algorithm. Nobody has yet found a weak point on it, and thus experiments show that AES would be breakable in millions of years with all computers in the world [7]. The other branch of modern cryptography is public or asymmetric key cryptography, developed in mid 1970s. This branch is based on mathematical problems of one way trap door functions: discrete logarithm, discrete square root, and factorization with very large prime factors [8]. The solution to these problems is simple with a certain secret (private key), while without the secret it is