SlideShare uma empresa Scribd logo
1 de 15
Digital Signatures

RAVI JAIN
MET - DBM
Electronic Record
1. Very easy to make copies
2. Very fast distribution
3. Easy archiving and retrieval
4. Copies are as good as original
5. Easily modifiable
6. Environmental Friendly
Because of 4 & 5 together, these lack authenticity
Why Digital Signatures?
• To provide Authenticity,
Integrity and Non
-repudiation to electronic
documents
• To use the Internet as the
safe and secure medium
for e-Governance and eCommerce
What is Digital Signature?
 A digital signature is an electronic signature that can be used
to authenticate the identity of the sender of a message or the
signer of a document, and possibly to ensure that the original
content of the message or document that has been sent is
unchanged.
 Digital signatures are easily transportable, cannot be imitated
by someone else, and can be automatically time-stamped. The
ability to ensure that the original signed message arrived
means that the sender can not easily repudiate it later.
 The originator of a message uses a signing key (Private Key) to
sign the message and send the message and its digital signature
to a recipient
 The recipient uses a verification key (Public Key) to verify the
origin of the message and that it has not been tampered with
while in transit
Digital signatures employ a type of Asymmetric
Cryptography. The Scheme typically consists of
three Algorithms
 A key generation algorithm that selects a private key
uniformly at random from a set of possible private
keys. The algorithm outputs the private key and a
corresponding public key.
 A signing algorithm that, given a message and a
private key, produces a signature.
 A signature verifying algorithm that, given a message,
public key and a signature, either accepts or rejects
the message's claim to authenticity

Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document
Digital Signatures
Each individual generates his own key pair
[Public key known to everyone
&
Private key only to the owner]

Private Key – Used for making Digital Signature
Public Key – Used to verify the Digital Signature
Hardware Tokens

iKey

Smart Card
Smart Cards
•

The Private key is generated
in the crypto module residing
in the smart card.

•

The key is kept in the
memory of the smart card.

•

The key is highly secured as it
doesn’t leave the card, the
message digest is sent inside
the card for signing, and the
signatures leave the card.

•

The card gives mobility to the
key and signing can be done
on any system (Having smart
card reader).
iKeys or USB Tokens
•

They are similar to smart cards in
functionality as
– Key is generated inside the
token.
– Key is highly secured as it doesn’t
leave the token.
– Highly portable.
– Machine Independent.

•

iKEY is one of the most commonly
used token as it doesn’t need a
special reader and can be connected
to the system using USB port.
Private Key Protection
•

The Private key generated
is to be protected and kept
secret. The responsibility
of the secrecy of the key
lies with the owner.

•

The key is secured using
– PIN Protected soft token
– Smart Cards
– Hardware Tokens
Digital Signatures
I agree

efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.

fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.

0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.

ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.

01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents

• Digital Signatures are numbers
• Same Length – 40 digits
• They are document content dependent
Paper Signatures V/s Digital Signatures
Parameter

Paper

Electronic

Authenticity
V/s

May be forged

Integrity

Signature
Signature depends
independent of the on the contents of
document
the document

Nonrepudiation

a.
b.

Can not be copied

Handwriting a.
expert needed
Error prone
b.

Any computer
user
Error free
Role of Controller (CCA)
Controller of Certifying Authorities as
the “Root” Authority certifies the
technologies, infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
Seven CAs have been licensed by CCA
 Safescrypt
 National Informatics Center (NIC), Government of
India
 Institute for Development & Research in Banking
Technology (IDRBT) – A Spciety of Reserve Bank of
India
 Tata Consultancy Services (TCS)
 MTNL Trustline
 GNFC (Gujarat Narmada Fertilizer Corporation)
 E-MudhraCA
Thank You

Mais conteúdo relacionado

Mais procurados

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

Mais procurados (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 

Destaque

Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
Mahira Banu
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 

Destaque (10)

Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
What is Electronic Records Management?
What is Electronic Records Management?What is Electronic Records Management?
What is Electronic Records Management?
 

Semelhante a DIGITAL SIGNATURE

4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 

Semelhante a DIGITAL SIGNATURE (20)

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Digital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentationDigital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentation
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Digital signature
Digital signatureDigital signature
Digital signature
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 

Mais de ravijain90

Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
ravijain90
 
Linkedin but why
Linkedin but whyLinkedin but why
Linkedin but why
ravijain90
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 
why skype is useful
why skype is usefulwhy skype is useful
why skype is useful
ravijain90
 
Affiliate marketng
Affiliate marketngAffiliate marketng
Affiliate marketng
ravijain90
 

Mais de ravijain90 (6)

Android
AndroidAndroid
Android
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Linkedin but why
Linkedin but whyLinkedin but why
Linkedin but why
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
why skype is useful
why skype is usefulwhy skype is useful
why skype is useful
 
Affiliate marketng
Affiliate marketngAffiliate marketng
Affiliate marketng
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

DIGITAL SIGNATURE

  • 2. Electronic Record 1. Very easy to make copies 2. Very fast distribution 3. Easy archiving and retrieval 4. Copies are as good as original 5. Easily modifiable 6. Environmental Friendly Because of 4 & 5 together, these lack authenticity
  • 3. Why Digital Signatures? • To provide Authenticity, Integrity and Non -repudiation to electronic documents • To use the Internet as the safe and secure medium for e-Governance and eCommerce
  • 4. What is Digital Signature?  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit
  • 5. Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document
  • 6. Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature
  • 8. Smart Cards • The Private key is generated in the crypto module residing in the smart card. • The key is kept in the memory of the smart card. • The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. • The card gives mobility to the key and signing can be done on any system (Having smart card reader).
  • 9. iKeys or USB Tokens • They are similar to smart cards in functionality as – Key is generated inside the token. – Key is highly secured as it doesn’t leave the token. – Highly portable. – Machine Independent. • iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
  • 10. Private Key Protection • The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. • The key is secured using – PIN Protected soft token – Smart Cards – Hardware Tokens
  • 11. Digital Signatures I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 • These are digital signatures of same person on different documents • Digital Signatures are numbers • Same Length – 40 digits • They are document content dependent
  • 12. Paper Signatures V/s Digital Signatures Parameter Paper Electronic Authenticity V/s May be forged Integrity Signature Signature depends independent of the on the contents of document the document Nonrepudiation a. b. Can not be copied Handwriting a. expert needed Error prone b. Any computer user Error free
  • 13. Role of Controller (CCA) Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 14. Seven CAs have been licensed by CCA  Safescrypt  National Informatics Center (NIC), Government of India  Institute for Development & Research in Banking Technology (IDRBT) – A Spciety of Reserve Bank of India  Tata Consultancy Services (TCS)  MTNL Trustline  GNFC (Gujarat Narmada Fertilizer Corporation)  E-MudhraCA

Notas do Editor

  1. One cd rom=one tree