SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
DIGITAL SIGNATURES
By:-
Ishwar Dayal
9/17/2013DepartmentOfInformationTechnology,GoB
1
WHY DIGITAL SIGNATURES?
9/17/2013DepartmentOfInformationTechnology,GoB
 To provide Authenticity, Integrity
and Non -repudiation to electronic
documents
 To use the Internet as the safe and
secure medium for e-Governance
and e-Commerce
2
WHAT IS DIGITAL SIGNATURE?
 A digital signature is an electronic signature that can
be used to authenticate the identity of the sender of a
message or the signer of a document, and possibly to
ensure that the original content of the message or
document that has been sent is unchanged.
 Digital signatures are easily transportable, cannot be
imitated by someone else, and can be automatically
time-stamped. The ability to ensure that the original
signed message arrived means that the sender can
not easily repudiate it later.
 The originator of a message uses a signing key
(Private Key) to sign the message and send the
message and its digital signature to a recipient
 The recipient uses a verification key (Public Key) to
verify the origin of the message and that it has not
been tampered with while in transit
9/17/2013DepartmentOfInformationTechnology,GoB
3
Digital signatures employ a type of Asymmetric
Cryptography. The Scheme typically consists of
three Algorithms
 A key generation algorithm that selects a private key
uniformly at random from a set of possible private keys.
The algorithm outputs the private key and a
corresponding public key.
 A signing algorithm that, given a message and a private
key, produces a signature.
 A signature verifying algorithm that, given a message,
public key and a signature, either accepts or rejects the
message's claim to authenticity
9/17/2013DepartmentOfInformationTechnology,GoB
Hash value of a message when encrypted with the
private key of a person is his digital signature on that
e-Document
4
DIGITAL SIGNATURES
9/17/2013DepartmentOfInformationTechnology,GoB
Each individual generates his own key pair
[Public key known to everyone
&
Private key only to the owner]
Private Key – Used for making Digital Signature
Public Key – Used to verify the Digital Signature
5
HARDWARE TOKENS
9/17/2013DepartmentOfInformationTechnology,GoB
iKey Smart Card
6
SMART CARDS
9/17/2013DepartmentOfInformationTechnology,GoB
 The Private key is
generated in the crypto
module residing in the
smart card.
 The key is kept in the
memory of the smart card.
 The key is highly secured
as it doesn’t leave the card,
the message digest is sent
inside the card for signing,
and the signatures leave
the card.
 The card gives mobility to
the key and signing can be
done on any system
(Having smart card
reader). 7
IKEYS OR USB TOKENS
9/17/2013DepartmentOfInformationTechnology,GoB
 They are similar to smart
cards in functionality as
 Key is generated inside the
token.
 Key is highly secured as it
doesn’t leave the token.
 Highly portable.
 Machine Independent.
 iKEY is one of the most
commonly used token as it
doesn’t need a special
reader and can be
connected to the system
using USB port. 8
PRIVATE KEY PROTECTION
 The Private key generated is to be protected and
kept secret. The responsibility of the secrecy of
the key lies with the owner.
 The key is secured using
 PIN Protected soft token
 Smart Cards
 Hardware Tokens
9/17/2013DepartmentOfInformationTechnology,GoB
9
DIGITAL SIGNATURES
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
 These are digital signatures of same person on
different documents
9/17/2013DepartmentOfInformationTechnology,GoB
• Digital Signatures are numbers
• Same Length – 40 digits
• They are document content dependent
10
Paper Signatures V/s Digital
Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature
independent of the
document
Signature depends
on the contents of
the document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
9/17/2013DepartmentOfInformationTechnology,GoB
11
 Controller of Certifying Authorities as
the “Root” Authority certifies the
technologies, infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
Role of Controller (CCA)
9/17/2013DepartmentOfInformationTechnology,GoB
12
SEVEN CAS HAVE BEEN LICENSED BY
CCA
 Safescrypt
 National Informatics Center (NIC),
Government of India
 Institute for Development & Research in
Banking Technology (IDRBT) – A Spciety of
Reserve Bank of India
 Tata Consultancy Services (TCS)
 MTNL Trustline
 GNFC (Gujarat Narmada Fertilizer
Corporation)
 E-MudhraCA
9/17/2013DepartmentOfInformationTechnology,GoB
13
Prevention From Misuse
 Do’t Hand over you DSC Media
USB/Card to any one
 Do’t tell your PIN to anyone
 Document Digitally Signed carries
same legal status as manually
signing as per the IT Act
9/17/2013DepartmentOfInformationTechnology,GoB
14
THANK YOU
9/17/2013DepartmentOfInformationTechnology,GoB
15

Más contenido relacionado

La actualidad más candente

Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 

La actualidad más candente (20)

Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 

Similar a Digital signatures

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationINPI ASIA Admin
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfCA Divya
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfMehediHasanShaon1
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmgauravv7536
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Future Insights
 
Digital signature by SSL Europa
Digital signature by SSL EuropaDigital signature by SSL Europa
Digital signature by SSL Europassleuropa
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
 

Similar a Digital signatures (20)

Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdf
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithm
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Digital signature by SSL Europa
Digital signature by SSL EuropaDigital signature by SSL Europa
Digital signature by SSL Europa
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 

Último

Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteriamilos639
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsAlejandro Cremades
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastInstBlast Marketing
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product DiscoveryDesmond Leo
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionAlejandro Cremades
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportDubai Multi Commodity Centre
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdflinciy03
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...srcw2322l101
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideCharleston Alexander
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Alejandro Cremades
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Associationseri bangash
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckHajeJanKamps
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Rahul Bedi
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsSlidesAI
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerAlejandro Cremades
 

Último (20)

Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 

Digital signatures

  • 2. WHY DIGITAL SIGNATURES? 9/17/2013DepartmentOfInformationTechnology,GoB  To provide Authenticity, Integrity and Non -repudiation to electronic documents  To use the Internet as the safe and secure medium for e-Governance and e-Commerce 2
  • 3. WHAT IS DIGITAL SIGNATURE?  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit 9/17/2013DepartmentOfInformationTechnology,GoB 3
  • 4. Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity 9/17/2013DepartmentOfInformationTechnology,GoB Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document 4
  • 5. DIGITAL SIGNATURES 9/17/2013DepartmentOfInformationTechnology,GoB Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature 5
  • 7. SMART CARDS 9/17/2013DepartmentOfInformationTechnology,GoB  The Private key is generated in the crypto module residing in the smart card.  The key is kept in the memory of the smart card.  The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card.  The card gives mobility to the key and signing can be done on any system (Having smart card reader). 7
  • 8. IKEYS OR USB TOKENS 9/17/2013DepartmentOfInformationTechnology,GoB  They are similar to smart cards in functionality as  Key is generated inside the token.  Key is highly secured as it doesn’t leave the token.  Highly portable.  Machine Independent.  iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port. 8
  • 9. PRIVATE KEY PROTECTION  The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner.  The key is secured using  PIN Protected soft token  Smart Cards  Hardware Tokens 9/17/2013DepartmentOfInformationTechnology,GoB 9
  • 10. DIGITAL SIGNATURES I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3  These are digital signatures of same person on different documents 9/17/2013DepartmentOfInformationTechnology,GoB • Digital Signatures are numbers • Same Length – 40 digits • They are document content dependent 10
  • 11. Paper Signatures V/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free 9/17/2013DepartmentOfInformationTechnology,GoB 11
  • 12.  Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates Role of Controller (CCA) 9/17/2013DepartmentOfInformationTechnology,GoB 12
  • 13. SEVEN CAS HAVE BEEN LICENSED BY CCA  Safescrypt  National Informatics Center (NIC), Government of India  Institute for Development & Research in Banking Technology (IDRBT) – A Spciety of Reserve Bank of India  Tata Consultancy Services (TCS)  MTNL Trustline  GNFC (Gujarat Narmada Fertilizer Corporation)  E-MudhraCA 9/17/2013DepartmentOfInformationTechnology,GoB 13
  • 14. Prevention From Misuse  Do’t Hand over you DSC Media USB/Card to any one  Do’t tell your PIN to anyone  Document Digitally Signed carries same legal status as manually signing as per the IT Act 9/17/2013DepartmentOfInformationTechnology,GoB 14