SlideShare una empresa de Scribd logo
1 de 20
Digital Signature
•is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than written,
form. Digital signature schemes normally give two algorithms, one
for signing which involves the user's secret or private key, and
one for verifying signatures which involves the user's public key.
The output of the signature process is called the "digital signature.“
•is an electronic signature that can be used to authenticate the
identity of the sender of a message or the signer of a document,
and possibly to ensure that the original content of the message or
document that has been sent is unchanged. Digital signatures are
easily transportable, cannot be imitated by someone else, and can
be automatically time-stamped. The ability to ensure that the
original signed message arrived means that the sender cannot
easily repudiate it later.
What is a digital signature?
How it works
• The use of digital signatures usually involves two
processes, one performed by the signer and the other by
the receiver of the digital signature:
• Digital signature creation uses a hash result derived
from and unique to both the signed message and a given
private key. For the hash result to be secure, there must
be only a negligible possibility that the same digital
signature could be created by the combination of any
other message or private key.
• Digital signature verification is the process of checking
the digital signature by reference to the original message
and a given public key, thereby determining whether the
digital signature was created for that same message
using the private key that corresponds to the referenced
public key.
Smart Cards
• The Private key is generated
in the crypto module
residing in the smart card.
• The key is kept in the
memory of the smart card.
• The key is highly secured as
it doesn’t leave the card, the
message digest is sent
inside the card for signing,
and the signatures leave the
card.
• The card gives mobility to
the key and signing can be
done on any system. (Having
smart card reader)
Hardware Tokens
• They are similar to smart
cards in functionality as
– Key is generated inside the
token.
– Key is highly secured as it
doesn’t leave the token.
– Highly portable.
– Machine Independent.
• iKEY is one of the most
commonly used token as it
doesn’t need a special reader
and can be connected to the
system using USB port.
Smart Card
iKey
Hardware Tokens
Biometrics – adds another level of security to these tokens
Public Key Infrastructure (PKI)
• Some Trusted Agency is required which certifies
the association of an individual with the key pair.
Certifying Authority (CA)
• This association is done by issuing a certificate
to the user by the CA
Public key certificate (PKC)
• All public key certificates are digitally signed by
the CA
Certifying Authority
• Must be widely known and trusted
• Must have well defined Identification process before
issuing the certificate
• Provides online access to all the certificates issued
• Provides online access to the list of certificates
revoked
• Displays online the license issued by the Controller
• Displays online approved Certification Practice
Statement (CPS)
• Must adhere to IT Act/Rules/Regulations and
Guidelines
• Must be widely known and trusted
• Must have well defined Identification process before
issuing the certificate
• Provides online access to all the certificates issued
• Provides online access to the list of certificates
revoked
• Displays online the license issued by the Controller
• Displays online approved Certification Practice
Statement (CPS)
• Must adhere to IT Act/Rules/Regulations and
Guidelines
Public-Key Certification
Signed
by using
CA’s
private
key
Signed
by using
CA’s
private
key
User
Name &
other
credentials
User
Name &
other
credentials
User’s
Public
key
User’s
Public
key
User Certificate
Certificate
Database
Publis
h
Certificate
Request
User Name
User’s
Public Key
CA’s Name
Validity
Digital
Signature
of CA
Certificate
Class
User’s Email
Address
Serial No.
Key pair
Generation
Private
Public
Web site of CA
User 1 certificate
User 2 certificate
.
Public
License issued
by CCA
Private key of CA or CCA require highest level
of security
Hardware Security Module (HSM) is used for
storing the Private Key
More than one person are required for signing
HSM is housed in a strong room with video
surveillance on 24x7 basis.
Trust Path
•Controller is the Root certifying authority
responsible for regulating Certifying
Authorities (CAs)
• Controller certifies the association of CA
with his public key
•Certifying Authority (CA) is the trusted
authority responsible for creating or
certifying identities.
•CA certifies the association of an
individual with his public key
Role of controller
Controller of Certifying Authorities
as the “Root” Authority certifies the
technologies,infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
Summary
• Each individual has a pair of keys
• Public key of each individual is certified
by a CA (Certifying Authority)
• Public keys of CAs are certified by the
Controller
• Public key of the Controller is self
certified
• Public keys of everyone are known to all
concerned and are also available on the
web
• Certification Practice Statement is
displayed on the web site
Applications in Telecommunications
A. Subscribers
 Subscriber’s services management
• STD/ISD, Opening, Closing, Initializing Password
 Shifting of telephones, Accessories (Clip, Cordless)
 Small Payments through telephones bills
• Books, gifts, Internet purchases
 Mobile Authentication of SMS
• Share market trading, Intra/Inter office instructions
 Mobile Phones as Credit cards
• Mobile operator can venture into credit card business
Applications in Telecommunications
(contd.)
B. Internal
 Intra/Inter offices authentic
communications
• OBs, approvals, Instructions, requests
 Procurement of material
• Calling/Receiving bids, Purchase orders,
Payment instructions
 Network Management functions
• Change of configuration, Blocking/unblocking
routes
Example
• Assume you were going to send the draft of a contract to your
lawyer in another town. You want to give your lawyer the assurance
that it was unchanged from what you sent and that it is really from
you.
1. You copy-and-paste the contract (it's a short one!) into an e-mail
note.
2. Using special software, you obtain a message hash (mathematical
summary) of the contract.
3. You then use a private key that you have previously obtained from a
public-private key authority to encrypt the hash.
4. The encrypted hash becomes your digital signature of the message.
(Note that it will be different each time you send a message.)
• At the other end, your lawyer receives the message.
1. To make sure it's intact and from you, your lawyer makes a hash of
the received message.
2. Your lawyer then uses your public key to decrypt the message hash
or summary.
3. If the hashes match, the received message is valid.
Benefits of digital signatures
These are common reasons for applying a digital signature to communications:
• Authentication
Although messages may often include information about the entity sending
a message, that information may not be accurate. Digital signatures can be
used to authenticate the source of messages. When ownership of a digital
signature secret key is bound to a specific user, a valid signature shows that
the message was sent by that user. The importance of high confidence in
sender authenticity is especially obvious in a financial context. For example,
suppose a bank's branch office sends instructions to the central office
requesting a change in the balance of an account. If the central office is not
convinced that such a message is truly sent from an authorized source,
acting on such a request could be a grave mistake.
• Integrity
In many scenarios, the sender and receiver of a message may have a need
for confidence that the message has not been altered during transmission.
Although encryption hides the contents of a message, it may be possible to
change an encrypted message without understanding it. (Some encryption
algorithms, known as nonmalleable ones, prevent this, but others do not.)
However, if a message is digitally signed, any change in the message will
invalidate the signature. Furthermore, there is no efficient way to modify a
message and its signature to produce a new message with a valid
signature, because this is still considered to be computationally infeasible by
most cryptographic hash functions.
Drawbacks of digital signatures
Despite their usefulness, digital signatures do not alone solve all
the problems we might wish them to.
Non-repudiation
In a cryptographic context, the word repudiation refers to the act
of disclaiming responsibility for a message. A message's
recipient may insist the sender attach a signature in order to
make later repudiation more difficult, since the recipient can
show the signed message to a third party (eg, a court) to
reinforce a claim as to its signatories and integrity. However,
loss of control over a user's private key will mean that all digital
signatures using that key, and so ostensibly 'from' that user, are
suspect. Nonetheless, a user cannot repudiate a signed
message without repudiating their signature key.

Más contenido relacionado

La actualidad más candente

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

La actualidad más candente (20)

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
cryptography
cryptographycryptography
cryptography
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Encryption
EncryptionEncryption
Encryption
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Destacado

Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
Mecheko Sha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 

Destacado (20)

Hash Function
Hash FunctionHash Function
Hash Function
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Hash function
Hash function Hash function
Hash function
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Aes
AesAes
Aes
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 

Similar a Digital signature

Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
listergc
 

Similar a Digital signature (20)

E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Unit v
Unit vUnit v
Unit v
 

Más de AJAL A J

Más de AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Digital signature

  • 2. •is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature.“ •is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. What is a digital signature?
  • 3. How it works • The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: • Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. • Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 4. Smart Cards • The Private key is generated in the crypto module residing in the smart card. • The key is kept in the memory of the smart card. • The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. • The card gives mobility to the key and signing can be done on any system. (Having smart card reader)
  • 5. Hardware Tokens • They are similar to smart cards in functionality as – Key is generated inside the token. – Key is highly secured as it doesn’t leave the token. – Highly portable. – Machine Independent. • iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
  • 6. Smart Card iKey Hardware Tokens Biometrics – adds another level of security to these tokens
  • 7.
  • 8. Public Key Infrastructure (PKI) • Some Trusted Agency is required which certifies the association of an individual with the key pair. Certifying Authority (CA) • This association is done by issuing a certificate to the user by the CA Public key certificate (PKC) • All public key certificates are digitally signed by the CA
  • 9. Certifying Authority • Must be widely known and trusted • Must have well defined Identification process before issuing the certificate • Provides online access to all the certificates issued • Provides online access to the list of certificates revoked • Displays online the license issued by the Controller • Displays online approved Certification Practice Statement (CPS) • Must adhere to IT Act/Rules/Regulations and Guidelines • Must be widely known and trusted • Must have well defined Identification process before issuing the certificate • Provides online access to all the certificates issued • Provides online access to the list of certificates revoked • Displays online the license issued by the Controller • Displays online approved Certification Practice Statement (CPS) • Must adhere to IT Act/Rules/Regulations and Guidelines
  • 10. Public-Key Certification Signed by using CA’s private key Signed by using CA’s private key User Name & other credentials User Name & other credentials User’s Public key User’s Public key User Certificate Certificate Database Publis h Certificate Request User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No. Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA
  • 11. Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key More than one person are required for signing HSM is housed in a strong room with video surveillance on 24x7 basis.
  • 12. Trust Path •Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs) • Controller certifies the association of CA with his public key •Certifying Authority (CA) is the trusted authority responsible for creating or certifying identities. •CA certifies the association of an individual with his public key
  • 13. Role of controller Controller of Certifying Authorities as the “Root” Authority certifies the technologies,infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 14. Summary • Each individual has a pair of keys • Public key of each individual is certified by a CA (Certifying Authority) • Public keys of CAs are certified by the Controller • Public key of the Controller is self certified • Public keys of everyone are known to all concerned and are also available on the web • Certification Practice Statement is displayed on the web site
  • 15. Applications in Telecommunications A. Subscribers  Subscriber’s services management • STD/ISD, Opening, Closing, Initializing Password  Shifting of telephones, Accessories (Clip, Cordless)  Small Payments through telephones bills • Books, gifts, Internet purchases  Mobile Authentication of SMS • Share market trading, Intra/Inter office instructions  Mobile Phones as Credit cards • Mobile operator can venture into credit card business
  • 16. Applications in Telecommunications (contd.) B. Internal  Intra/Inter offices authentic communications • OBs, approvals, Instructions, requests  Procurement of material • Calling/Receiving bids, Purchase orders, Payment instructions  Network Management functions • Change of configuration, Blocking/unblocking routes
  • 17. Example • Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you. 1. You copy-and-paste the contract (it's a short one!) into an e-mail note. 2. Using special software, you obtain a message hash (mathematical summary) of the contract. 3. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash. 4. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.) • At the other end, your lawyer receives the message. 1. To make sure it's intact and from you, your lawyer makes a hash of the received message. 2. Your lawyer then uses your public key to decrypt the message hash or summary. 3. If the hashes match, the received message is valid.
  • 18.
  • 19. Benefits of digital signatures These are common reasons for applying a digital signature to communications: • Authentication Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake. • Integrity In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 20. Drawbacks of digital signatures Despite their usefulness, digital signatures do not alone solve all the problems we might wish them to. Non-repudiation In a cryptographic context, the word repudiation refers to the act of disclaiming responsibility for a message. A message's recipient may insist the sender attach a signature in order to make later repudiation more difficult, since the recipient can show the signed message to a third party (eg, a court) to reinforce a claim as to its signatories and integrity. However, loss of control over a user's private key will mean that all digital signatures using that key, and so ostensibly 'from' that user, are suspect. Nonetheless, a user cannot repudiate a signed message without repudiating their signature key.