SlideShare una empresa de Scribd logo
1 de 31
PRESENTED BY:
                ANKITA DAVE
                              1
SR.NO.                     TOPIC                        SLIDE NO.
  1.     WHAT IS DIGITAL SIGNATURES?                        4
  2.     WHY DIGITAL SIGNATURES?                            5
  3.     PAPER SIGNATURES VS DIGITAL SIGNATURES             6
  4.     PRIVATE KEY & PUBLIC KEY                           7
  5.     PROTECTION OF PRIVATE KEY                          8
  6.     WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)?       9
  7.     CERTIFICATION AUTHORITY (CA)                      10
  8.     HOW DOES DIGITAL SIGNATURES WORKS?                11
  9.     PROCEDURE TO OBTAIN DSC                           12

                                                                    2
SR.NO.                      TOPIC                        SLIDE NO.
  10.    STEP 1: DOWNLOADING ROOT CERTIFICATE               13
  11.    STEP 2: SELECTING A CERTIFYING AUTHORITY           18
  12.    STEP 3: VISIT THE WEBSITE OF THE CA                19
  13.    CLASS- 1 CERTIFICATES                              20
  14.    CLASS- 2 CERTIFICATES                              21
  15.    CLASS- 3 CERTIFICATES                              22
  16.    STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED      23
  17.    STEP 5: SUBMIT AN ONLINE REQUEST                   24
  18.    CONCLUSION                                         29
  19.    SOURCES OF INFORMATION                             30
                                                                     3
   As per Information Technology
    Act 2000, digital signature
    means authentication of any
    electronic record by means of
    an electronic.
   Simply, signature in digital form
                OR
    Mark to authenticate a
    document.
                                        4
   Authentification.
   Integrity.
   Low cost.
   Eliminates the use of paper.
   Faster procedures.
   Completely secure.




                                   5
PARAMETER           PAPER             DIGITAL

Authenticity      May be forged    Can not be copied
Integrity         Signature        Signature depends
                  independent of   on the contents of
                  the document     the document
Non-repudiation   a. Handwriting   a. Any computer
                     expert needed    user
                  b. Error prone   b. Error free
                                                        6
Each individual generates his own key pair.

  PRIVATE KEY              PUBLIC KEY


     Known only to              Known to
        owner                   everyone

    Used for making           Used to verify
    digital signature        digital signature

                                                 7
The private key generated is to be protected &
 kept in secret because
   Can be misused by anyone who is having
    access to your computer system.
   Is lost if computer system is formatted or
    internet explorer is changed.
 The key is secured using



                                                  8
Is an electronic means of establishing records
 when doing transactions on the Internet.
Are easily transportable and cannot be imitated.
Contains details like owner’s name & public
 key, expiration date of public, serial number &
 name of the issuer (the Certification Authority) &
 his digital signature.
It is issued so that Recipient can verify that the
 certificate is authentic.
                                                 9
SR. NO. NAMES OF CA             WEBSITES
  1.   NIC              nicca.nic.in
  2.   GNFC             www.ncodesolutions.com
  3.   SAFESCRYPT       www.safescrypt.com
  4.   TCS              www.tcs-ca.tcs.co.in
  5.   MTNL TRUSTLINE   www.mtnltrustline.com
  6.   IDRBT            www.idrbtca.org.in
  7.   E-MUDHRA         www.e-Mudhra.com




                                                 10
11
DOWNLOADING ROOT CERTIFICATE

    SELECTING A CERTIFYING AUTHORITY

VISIT THE WEBSITE OF CERTIFYING AUTHORITY

  SELECT THE TYPE OF CERTIFICATE NEEDED

       SUBMIT AN ONLINE REQUEST


                                            12
Visit the website of the Controller of Certifying
       Authorities (CCA) at www.cca.gov.in.




                                                    13
14
15
16
17
 Visit the website of the CCA at www.cca.gov.in
 to obtain a list of licensed Certifying Authorities
 in India.
 Based on information and study of the relevant
 websites, select a Certifying Authority.
  Example: TCS official website is
 www.tcs-ca.tcs.co.in.



                                                   18
A visit to the select CA website provides
  following three types of digital signature
  certificates:
CLASSES OF DSC:
 Class-1 certificates
 Class-2 certificates
 Class-3 certificates.

                                               19
 These Certificates are personal e-mail
 Certificates that allows you to secure your email
 messages. These certificates can be used to:
 1. Digitally sign email.
 2. Encrypt email.
 3. Authenticate to Web Servers.
 These certificates, however, do not facilitate
 strong authentication of the identity of the
 subscriber and hence, cannot be relied upon
 where proof of identity is required (commercial
 use).                                           20
   These Certificates are issued as Managed Digital
    Certificates to employees/ partners/ affiliates/
    customers of business and government
    organizations that are ready to assume the
    responsibility of verifying the accuracy of the
    information submitted by their employees/
    partners/ affiliates/ customers.
   These certificates issued under the TCS-CA Trust
    Network are legally valid under the Indian IT Act
    2000.
                                                    21
   These Certificates are issued to individuals,
    companies and government organizations.
   They can be used both for personal and
    commercial purposes.
   They are typically used for electronic commerce
    applications where security is a major concern.
   These Certificates issued by the TCS-CA are
    legally valid under Indian IT Act 2000.


                                                  22
We need a legally valid digital signature
certificate for an individual. The relevant
certificate is a class-3 certificate.




                                              23
The next step is to create a user account on the
TCS CA website, complete an online enrollment
form and generate a cryptographic key pair on
our computer.




                                               24
25
26
27
28
Hence, we can conclude that digital signatures:
Minimizes the risk of dealing with imposters.
Minimizes the risk of undetected message
 tampering and forgery.
Retains a high degree of information security.




                                                  29
asclonline.com/images/d/d4/Simple_Guide_to_
 Digital_Signatures.pdf
www.youdzone.com/signature.html
en.wikipedia.org/wiki/Digital_signatures
www.cca.gov.in
esolutions.net.in/digitalsignatures.html
nsdl.co.in/business/cirRec_18Mar08.doc



                                           30
Digital signature 3

Más contenido relacionado

La actualidad más candente

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Hai Nguyen
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
Sachi Sawamura
 

La actualidad más candente (20)

Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 Presentation
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Digital signature
Digital signatureDigital signature
Digital signature
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
NetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2aNetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2a
 

Similar a Digital signature 3

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 

Similar a Digital signature 3 (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Advance itt
Advance ittAdvance itt
Advance itt
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSC
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Digital signature 3

  • 1. PRESENTED BY: ANKITA DAVE 1
  • 2. SR.NO. TOPIC SLIDE NO. 1. WHAT IS DIGITAL SIGNATURES? 4 2. WHY DIGITAL SIGNATURES? 5 3. PAPER SIGNATURES VS DIGITAL SIGNATURES 6 4. PRIVATE KEY & PUBLIC KEY 7 5. PROTECTION OF PRIVATE KEY 8 6. WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)? 9 7. CERTIFICATION AUTHORITY (CA) 10 8. HOW DOES DIGITAL SIGNATURES WORKS? 11 9. PROCEDURE TO OBTAIN DSC 12 2
  • 3. SR.NO. TOPIC SLIDE NO. 10. STEP 1: DOWNLOADING ROOT CERTIFICATE 13 11. STEP 2: SELECTING A CERTIFYING AUTHORITY 18 12. STEP 3: VISIT THE WEBSITE OF THE CA 19 13. CLASS- 1 CERTIFICATES 20 14. CLASS- 2 CERTIFICATES 21 15. CLASS- 3 CERTIFICATES 22 16. STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED 23 17. STEP 5: SUBMIT AN ONLINE REQUEST 24 18. CONCLUSION 29 19. SOURCES OF INFORMATION 30 3
  • 4. As per Information Technology Act 2000, digital signature means authentication of any electronic record by means of an electronic.  Simply, signature in digital form OR Mark to authenticate a document. 4
  • 5. Authentification.  Integrity.  Low cost.  Eliminates the use of paper.  Faster procedures.  Completely secure. 5
  • 6. PARAMETER PAPER DIGITAL Authenticity May be forged Can not be copied Integrity Signature Signature depends independent of on the contents of the document the document Non-repudiation a. Handwriting a. Any computer expert needed user b. Error prone b. Error free 6
  • 7. Each individual generates his own key pair. PRIVATE KEY PUBLIC KEY Known only to Known to owner everyone Used for making Used to verify digital signature digital signature 7
  • 8. The private key generated is to be protected & kept in secret because  Can be misused by anyone who is having access to your computer system.  Is lost if computer system is formatted or internet explorer is changed.  The key is secured using 8
  • 9. Is an electronic means of establishing records when doing transactions on the Internet. Are easily transportable and cannot be imitated. Contains details like owner’s name & public key, expiration date of public, serial number & name of the issuer (the Certification Authority) & his digital signature. It is issued so that Recipient can verify that the certificate is authentic. 9
  • 10. SR. NO. NAMES OF CA WEBSITES 1. NIC nicca.nic.in 2. GNFC www.ncodesolutions.com 3. SAFESCRYPT www.safescrypt.com 4. TCS www.tcs-ca.tcs.co.in 5. MTNL TRUSTLINE www.mtnltrustline.com 6. IDRBT www.idrbtca.org.in 7. E-MUDHRA www.e-Mudhra.com 10
  • 11. 11
  • 12. DOWNLOADING ROOT CERTIFICATE SELECTING A CERTIFYING AUTHORITY VISIT THE WEBSITE OF CERTIFYING AUTHORITY SELECT THE TYPE OF CERTIFICATE NEEDED SUBMIT AN ONLINE REQUEST 12
  • 13. Visit the website of the Controller of Certifying Authorities (CCA) at www.cca.gov.in. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.  Visit the website of the CCA at www.cca.gov.in to obtain a list of licensed Certifying Authorities in India.  Based on information and study of the relevant websites, select a Certifying Authority. Example: TCS official website is www.tcs-ca.tcs.co.in. 18
  • 19. A visit to the select CA website provides following three types of digital signature certificates: CLASSES OF DSC:  Class-1 certificates  Class-2 certificates  Class-3 certificates. 19
  • 20.  These Certificates are personal e-mail Certificates that allows you to secure your email messages. These certificates can be used to: 1. Digitally sign email. 2. Encrypt email. 3. Authenticate to Web Servers.  These certificates, however, do not facilitate strong authentication of the identity of the subscriber and hence, cannot be relied upon where proof of identity is required (commercial use). 20
  • 21. These Certificates are issued as Managed Digital Certificates to employees/ partners/ affiliates/ customers of business and government organizations that are ready to assume the responsibility of verifying the accuracy of the information submitted by their employees/ partners/ affiliates/ customers.  These certificates issued under the TCS-CA Trust Network are legally valid under the Indian IT Act 2000. 21
  • 22. These Certificates are issued to individuals, companies and government organizations.  They can be used both for personal and commercial purposes.  They are typically used for electronic commerce applications where security is a major concern.  These Certificates issued by the TCS-CA are legally valid under Indian IT Act 2000. 22
  • 23. We need a legally valid digital signature certificate for an individual. The relevant certificate is a class-3 certificate. 23
  • 24. The next step is to create a user account on the TCS CA website, complete an online enrollment form and generate a cryptographic key pair on our computer. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. Hence, we can conclude that digital signatures: Minimizes the risk of dealing with imposters. Minimizes the risk of undetected message tampering and forgery. Retains a high degree of information security. 29