Today, electronic signatures are increasingly used. Whether it's contracting or any other administrative process, it's much easier and less time-consuming to use digital documents instead of paper-based solutions. Electronic documents do not require a large number of copies to be printed, signed and posted, saving considerable time and energy, and e-commerce would not work without them. All this, however, requires a valid, authentic electronic signature. And electronic signatures are cryptographic operations that can be implemented through the Public Key Infrastructure (PKI), as required by law.

The use of PKI is necessary for IT security, which can only be guaranteed by a layered security system. PKI allows data and information to be transmitted securely thanks to encryption, which is why it is used for e.g. for espionage or netbanking. PKI is much more than traditional password protection, because identification and authentication are based on a much stricter certificate.

The internet is an open network, so by the time data reaches the sender it has passed through several providers. Asymmetric, or public-key, encryption guarantees that data is not accessible to third parties. This system uses key pairs of private and public keys to uniquely identify the two parties. PKI provides the right level of security for everyone, from individuals who want to secure their correspondence and online purchases to the various documentation systems from small, medium and large enterprises to public authorities.