digital signatures
TRANSCRIPT
Electronic Record
1. Easy retrieval2. Easy to make copies3. Easily modifiable4. Environmental Friendly5. Distribution
2 & 3 lake of Authenticity and Integrity
Digital Signatures
Contents:
Information Technology(IT) Act 2000.Controller of Certifying AuthoritiesTechnical Aspects Digital Signature Certificate
The Information Technology Act, 2000
Chapter : II Digital Signature and Electronic Signature
Section 3 Authentication of Electronic Records
- Any Subscriber can Authentication of Electronic record by affixing his Digital Signature(Owner of DSC)
- Asymmetric Crypto System and Hash function which transform initial records to another records
- Any person can use Public Key for verification electronic records and signature
- The Private key + Public Key = Key Pair
The Information Technology Act, 2000
Chapter : II Digital Signature and Electronic Signature
Section 3A Electronic Signature
- Subscriber may authenticate any electronic record which considered reliable and may be specified in Second Schedule.
(Context, Control, Alteration)
Controller of Certifying Authorities
About Controller of Certifying Authorities
- Appointed Under Section 17 of IT Act 2000 for License and Regulate Certifying Authorities.
- Come into existence on 1st November, 2000
- Its aims at promoting the growth of e-Commerce and e-Governance through wider use of Digital Signature
- The CCA certifies the public keys of CAs using its own private key.
Controller of Certifying Authorities
Functions of Controller of Certifying Authorities- Supervision - Certifying Public Key- Laying Down Standards - Qualification and Experience of Employees- Specifying of Forms and Content of ESC- Specifying form of Account- Resolved conflict of CA’s and Subscribers- Laying down duties of CA’s
> Vision(To Create Trust) > Mission(Authentication of Electronic Document)
Technical Aspects of Digital Signature
Why Digital Signature? - Authenticity, Integrity and Non repudiation- e-Governance and e-Commerce
What is Digital Signature? - Electronic Signature- Transportable, No imitated, time stamped(Validity)- Private Key (Owner’s Key)- Public Key (Verification Key)- Hash Functions (Algorithm mapping)
Technical Aspects of Digital Signature
Message+
Signature
Hash
DecryptSignatureWith Sender’s Public Key
SIGN hashWith Sender’s Private key
Message+
signature
COMPARE
Calculated Hash
Message C-Form
SenderGCT
ReceiverDealer
Hash
Signed Message
Sent thru’ Internet
ifOK
Signatures verified
Thanking You
Prepared By : Paresh A. VadherM. +91 88665 [email protected]