SlideShare uma empresa Scribd logo
1 de 15
Digital Signatures

RAVI JAIN
MET - DBM
Electronic Record
1. Very easy to make copies
2. Very fast distribution
3. Easy archiving and retrieval
4. Copies are as good as original
5. Easily modifiable
6. Environmental Friendly
Because of 4 & 5 together, these lack authenticity
Why Digital Signatures?
• To provide Authenticity,
Integrity and Non
-repudiation to electronic
documents
• To use the Internet as the
safe and secure medium
for e-Governance and eCommerce
What is Digital Signature?
 A digital signature is an electronic signature that can be used
to authenticate the identity of the sender of a message or the
signer of a document, and possibly to ensure that the original
content of the message or document that has been sent is
unchanged.
 Digital signatures are easily transportable, cannot be imitated
by someone else, and can be automatically time-stamped. The
ability to ensure that the original signed message arrived
means that the sender can not easily repudiate it later.
 The originator of a message uses a signing key (Private Key) to
sign the message and send the message and its digital signature
to a recipient
 The recipient uses a verification key (Public Key) to verify the
origin of the message and that it has not been tampered with
while in transit
Digital signatures employ a type of Asymmetric
Cryptography. The Scheme typically consists of
three Algorithms
 A key generation algorithm that selects a private key
uniformly at random from a set of possible private
keys. The algorithm outputs the private key and a
corresponding public key.
 A signing algorithm that, given a message and a
private key, produces a signature.
 A signature verifying algorithm that, given a message,
public key and a signature, either accepts or rejects
the message's claim to authenticity

Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document
Digital Signatures
Each individual generates his own key pair
[Public key known to everyone
&
Private key only to the owner]

Private Key – Used for making Digital Signature
Public Key – Used to verify the Digital Signature
Hardware Tokens

iKey

Smart Card
Smart Cards
•

The Private key is generated
in the crypto module residing
in the smart card.

•

The key is kept in the
memory of the smart card.

•

The key is highly secured as it
doesn’t leave the card, the
message digest is sent inside
the card for signing, and the
signatures leave the card.

•

The card gives mobility to the
key and signing can be done
on any system (Having smart
card reader).
iKeys or USB Tokens
•

They are similar to smart cards in
functionality as
– Key is generated inside the
token.
– Key is highly secured as it doesn’t
leave the token.
– Highly portable.
– Machine Independent.

•

iKEY is one of the most commonly
used token as it doesn’t need a
special reader and can be connected
to the system using USB port.
Private Key Protection
•

The Private key generated
is to be protected and kept
secret. The responsibility
of the secrecy of the key
lies with the owner.

•

The key is secured using
– PIN Protected soft token
– Smart Cards
– Hardware Tokens
Digital Signatures
I agree

efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.

fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.

0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.

ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.

01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents

• Digital Signatures are numbers
• Same Length – 40 digits
• They are document content dependent
Paper Signatures V/s Digital Signatures
Parameter

Paper

Electronic

Authenticity
V/s

May be forged

Integrity

Signature
Signature depends
independent of the on the contents of
document
the document

Nonrepudiation

a.
b.

Can not be copied

Handwriting a.
expert needed
Error prone
b.

Any computer
user
Error free
Role of Controller (CCA)
Controller of Certifying Authorities as
the “Root” Authority certifies the
technologies, infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
Seven CAs have been licensed by CCA
 Safescrypt
 National Informatics Center (NIC), Government of
India
 Institute for Development & Research in Banking
Technology (IDRBT) – A Spciety of Reserve Bank of
India
 Tata Consultancy Services (TCS)
 MTNL Trustline
 GNFC (Gujarat Narmada Fertilizer Corporation)
 E-MudhraCA
Thank You

Mais conteúdo relacionado

Mais procurados

Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
Ankita Dave
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 

Mais procurados (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
 

Destaque

Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
Mahira Banu
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 

Destaque (10)

Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and Signatures
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 

Semelhante a DIGITAL SIGNATURE

Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 

Semelhante a DIGITAL SIGNATURE (20)

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Digital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentationDigital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentation
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Digital signature
Digital signatureDigital signature
Digital signature
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 

Mais de ravijain90

Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
ravijain90
 
Linkedin but why
Linkedin but whyLinkedin but why
Linkedin but why
ravijain90
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 
why skype is useful
why skype is usefulwhy skype is useful
why skype is useful
ravijain90
 
Affiliate marketng
Affiliate marketngAffiliate marketng
Affiliate marketng
ravijain90
 

Mais de ravijain90 (6)

Android
AndroidAndroid
Android
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Linkedin but why
Linkedin but whyLinkedin but why
Linkedin but why
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
why skype is useful
why skype is usefulwhy skype is useful
why skype is useful
 
Affiliate marketng
Affiliate marketngAffiliate marketng
Affiliate marketng
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

DIGITAL SIGNATURE

  • 2. Electronic Record 1. Very easy to make copies 2. Very fast distribution 3. Easy archiving and retrieval 4. Copies are as good as original 5. Easily modifiable 6. Environmental Friendly Because of 4 & 5 together, these lack authenticity
  • 3. Why Digital Signatures? • To provide Authenticity, Integrity and Non -repudiation to electronic documents • To use the Internet as the safe and secure medium for e-Governance and eCommerce
  • 4. What is Digital Signature?  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit
  • 5. Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document
  • 6. Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature
  • 8. Smart Cards • The Private key is generated in the crypto module residing in the smart card. • The key is kept in the memory of the smart card. • The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. • The card gives mobility to the key and signing can be done on any system (Having smart card reader).
  • 9. iKeys or USB Tokens • They are similar to smart cards in functionality as – Key is generated inside the token. – Key is highly secured as it doesn’t leave the token. – Highly portable. – Machine Independent. • iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
  • 10. Private Key Protection • The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. • The key is secured using – PIN Protected soft token – Smart Cards – Hardware Tokens
  • 11. Digital Signatures I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 • These are digital signatures of same person on different documents • Digital Signatures are numbers • Same Length – 40 digits • They are document content dependent
  • 12. Paper Signatures V/s Digital Signatures Parameter Paper Electronic Authenticity V/s May be forged Integrity Signature Signature depends independent of the on the contents of document the document Nonrepudiation a. b. Can not be copied Handwriting a. expert needed Error prone b. Any computer user Error free
  • 13. Role of Controller (CCA) Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 14. Seven CAs have been licensed by CCA  Safescrypt  National Informatics Center (NIC), Government of India  Institute for Development & Research in Banking Technology (IDRBT) – A Spciety of Reserve Bank of India  Tata Consultancy Services (TCS)  MTNL Trustline  GNFC (Gujarat Narmada Fertilizer Corporation)  E-MudhraCA

Notas do Editor

  1. One cd rom=one tree