SlideShare a Scribd company logo
Digital Signatures
Electronic Record Very easy to make copies Very fast distribution Easy archiving and retrieval Copies are as good as original Easily modifiable Environmental Friendly  Because of  4  &  5  together, these lack authenticity
Why Digital Signatures? To provide Authenticity, Integrity and Non-repudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and e-Governance
Encryption Caesar Cipher The shift is linear and equidistributed  3  changes I agree   lcdjuhh Key Cipher The shift is linear (cyclic)  269 k.n.gupta 62   mewam3rzjba i+3=l Space=c [+3] k+2=m (dot)=e [+6] n=w [+9]
ENCRYPTION Message 2 The Internet knows no geographical boundaries. It has redefined time and space.  Advances in computer and telecommunication technologies have led to the explosive growth of the Internet.  This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.  Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 DECRYPTION Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 2 The Internet knows no geographical boundaries. It has redefined time and space.  Advances in computer and telecommunication technologies have led to the explosive growth of the Internet.  This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.  Same Key SYMMETRIC Different Keys [Keys of a pair – Public and Private] ASYMMETRIC [PKI]
 
Digital Signatures Digital Signatures are numbers Same Length – 40 digits They are document content dependent I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 These are digital signatures of same person on different documents
Concepts A 1024 bits number is a very big number much bigger than the total number of electrons in whole world. Trillions of Trillions of pairs of numbers exist in this range with each pair having following property A message encrypted with one element of the pair can be decrypted  ONLY  by the other element of the same pair Two  numbers of a pair are called keys, the Public Key & the Private Key.  User himself generates his own key pair on his computer Any message irrespective of its length can be compressed or abridged uniquely into a smaller length message called the Digest or the Hash. Smallest change in the message will change the Hash value Click for Hash Generation
What is Digital Signature? Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature
Digital Signatures Each individual generates his own key pair [Public key known to everyone &  Private key only to the owner ] Private Key  – Used for making digital signature Public Key  – Used to verify the digital signature
RSA Key pair  (including Algorithm identifier) [2048 bit] Private Key 3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83 463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e a146 2840 8102 0301 0001 Public Key 3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04de 45de af46 2240 8410 02f1 0001
RCAI PUBLIC KEY [Including Algorithm Identifier] RSA – 2048 bit 3082 010a 0282 0101 00aa d454 b97c 73bf 177a 0b2f 85ab 0738 3d76 8637 980c c815 52de 2fc6 9d09 3548 9c75 1dbe c705 3ad1 cfc7 db51 033c ebf6 a367 d693 b669 29b8 c147 851a b4f9 f1e4 e361 e1e8 91ea 8283 fe2f f3d4 7fdd fbb7 d761 ebb0 4cee 41e3 6e8d 3cd9 4ae0 569c 4270 9c5a 8725 cff7 bf2a b079 cb09 de1d 22e7 0bcc 800b 6118 fa28 963f d1c6 86c1 75b2 8f80 ff5c 83a7 7310 1f03 db26 1639 61cf db36 3a2b e5a5 8aa8 c9d6 c10d 5d03 b274 b36e 1c90 d8bc d561 9278 a3d7 146f 7006 f386 8cc6 3fae 5e99 b071 7f23 fcaa 4853 e2ff 5561 5bc8 1747 42f2 c180 79fe 7d74 0ea8 4550 69e0 e0e9 d91d 75a4 c144 6211 de1f 0a0d b295 9831 8c99 ae7e 5e0e da89 0f84 14d7 5b80 373f 57cc 70ec 7232 0502 0301 0001 This key is available at  cca.gov.in  and can be downloaded
Signed Messages Message + Signature Hash Decrypt Signature With  Sender’s  Public Key SIGN hash With  Sender’s  Private key Message + signature COMPARE Calculated  Hash Message Sender Receiver Sent thru’ Internet if OK Signatures verified Hash Signed Message
Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free
Demonstration… Key Generation Random Numbers RSA Key Pair  [Private/Public Key] Digital Signature Generate Message Digest  [SHA1] Encrypting Digest using Private Key  [Signatures] Attaching the Signatures to the message. Verification of Signatures Run the test for Authentication, Integrity and Non repudiation. Digital Signature Certificate ITU X.509 v3
Private key protection The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. The key is secured using PIN Protected soft token Smart Cards Hardware Tokens
PIN protected soft tokens The Private key is encrypted and kept on the Hard Disk in a file, this file is password protected. This forms the lowest level of security in protecting the key, as The key is highly reachable. PIN can be easily known or cracked. Soft tokens are also not preferred because The key becomes static and machine dependent. The key is in known file format.
Smart Cards The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system.   (Having smart card reader)
Hardware Tokens They are similar to smart cards in functionality as  Key is generated inside the token. Key is highly secured as it doesn’t leave the token. Highly portable. Machine Independent. iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
Smart Card iKey Hardware Tokens Biometrics  –  adds another level of security to these tokens
 
Public Key Infrastructure (PKI) Some Trusted Agency is required which certifies the association of an individual with the key pair. Certifying Authority (CA) This association is done by issuing a certificate to the user by the CA Public key certificate (PKC) All public key certificates are digitally signed by the CA
Certifying Authority Must be widely known and trusted Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates revoked Displays online the license issued by the Controller Displays  online  approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and Guidelines Must be widely known and trusted Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates  revoked Displays online the license issued by the Controller Displays  online  approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and  Guidelines
IDRBT Certificate Paper Electronic
Public-Key Certification Signed  by using CA’s private key User Name &  other  credentials User’s  Public key User Certificate Certificate  Database Publish Certificate Request Key pair  Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued  by CCA User Name User’s  Public Key CA’s Name Validity Digital  Signature  of CA Certificate  Class User’s Email Address Serial No.
Click for certificate generation demo Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key More than one person are required for signing HSM is housed in a strong room with video surveillance on 24x7 basis.
Trust Path Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs) Controller certifies the association of CA with his public key Certifying Authority (CA) is the trusted authority responsible for creating or certifying identities. CA certifies the association of an individual with his public key
Role of controller   Controller of Certifying Authorities as the “Root” Authority certifies the technologies,infrastructure and practices of all  the Certifying Authorities licensed to issue Digital Signature Certificates
Four CAs has been licensed Safescrypt  5 th  Feb 2002 A subsidiary of Satyam Infoway National Informatics Center (NIC) 17 th  July 2002 Govt. of India Institute for Development & Research in Banking Technology (IDRBT) 6 th  August 2002 A society of Reserve Bank of India Tata Consultancy Services (TCS) 9 th  September 2002 Charges of certificates varies from Rs. 500/- to Rs. 20,000/- per year
Summary Each individual has a pair of keys Public key of each individual is certified by a CA (Certifying Authority) Public keys of CAs are certified by the Controller Public key of the Controller is self certified Public keys of everyone are known to all concerned and are also available on the web Certification Practice Statement is displayed on the web site
Applications in Judiciary Instant posting of judgment on the web. Secured electronic communications within judiciary Authentic archiving of Judicial records Submission of affidavits Giving certified copies of the Judgment
Applications in Telecommunications Subscribers Subscriber’s services management STD/ISD, Opening, Closing, Initializing Password Shifting of telephones, Accessories (Clip, Cordless) Small Payments through telephones bills Books, gifts, Internet purchases Mobile Authentication of SMS Share market trading, Intra/Inter office instructions Mobile Phones as Credit cards Mobile operator can venture into credit card business
Applications in Telecommunications  (contd.) Internal Intra/Inter offices authentic communications OBs, approvals, Instructions, requests Procurement of material Calling/Receiving bids, Purchase orders, Payment instructions Network Management functions Change of configuration, Blocking/unblocking routes
Public Key Cryptography Encryption Technologies Document Document Encrypted Document Encrypted Document Public Key of B Confidentiality Private Key of B
E-Governance Empowering Citizens Transparency  Accountability Elimination of Intermediatory Encouraging Citizens to exercise their Rights
Government Online Issuing forms and licences Filing tax returns online Online Government orders/treasury orders Registration Online file movement system Public information records E-voting Railway reservations & ticketing E-education Online money orders
Thank You

More Related Content

PDF
Digital signatures
PPTX
Digital signature 2
PPT
DIGITAL SIGNATURE
PPTX
Digital signature
PPTX
Digital signature
PPTX
Digital signature
PPTX
Digital signatures
PPTX
Digital certificates
Digital signatures
Digital signature 2
DIGITAL SIGNATURE
Digital signature
Digital signature
Digital signature
Digital signatures
Digital certificates

What's hot (20)

PPTX
Digital signature
PPT
What is a Digital Signature? | How Digital Signature work?
PPTX
Digital Signatures
PPTX
PDF
Digital Signature
PPTX
Digital certificates and information security
PPTX
Digital signturue
PPTX
CYBER SECURITY : DIGITAL SIGNATURE,
PPTX
Kumkum digital certificate
PPT
Presentation on digital signatures & digital certificates
PDF
Digital certificates & its importance
PPT
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
PPT
Digital Certificate
PPTX
DIGITAL SIGNATURE PPT
PPT
Digital certificates
PPTX
Digital Signature
PPT
Digital signature Brief Introduction
PPTX
Digital signature
PDF
Enhancing System Security Using PKI
Digital signature
What is a Digital Signature? | How Digital Signature work?
Digital Signatures
Digital Signature
Digital certificates and information security
Digital signturue
CYBER SECURITY : DIGITAL SIGNATURE,
Kumkum digital certificate
Presentation on digital signatures & digital certificates
Digital certificates & its importance
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Digital Certificate
DIGITAL SIGNATURE PPT
Digital certificates
Digital Signature
Digital signature Brief Introduction
Digital signature
Enhancing System Security Using PKI
Ad

Similar to Digital signatures (20)

PPT
Digital Signature
PPT
Digital signature online - What is digital signature
PPT
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
PPT
ccapresentation.ppt
PPT
Digital Signature.ppt power ponit presentation
PPT
Digital signature
PPTX
Digital signature
PPT
PKI and Applications
PPTX
Digital signature & PKI Infrastructure
PPT
Introduction to Digital signature Basic Fundamentals
PDF
OpenOffice.org Digital Signatures, OOoCon 2004
PPT
Digital Signiture
PPT
Digital signature introduction
PPT
Digital signature
PPT
PKI_Applications digital certificate.ppt
PPTX
PPT
Security everywhere digital signature and digital fingerprint v1 (personal)
PPTX
Digital signature
PDF
CGI White Paper - Key Incryption Mechanism
PPT
Extra unit 2
Digital Signature
Digital signature online - What is digital signature
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
ccapresentation.ppt
Digital Signature.ppt power ponit presentation
Digital signature
Digital signature
PKI and Applications
Digital signature & PKI Infrastructure
Introduction to Digital signature Basic Fundamentals
OpenOffice.org Digital Signatures, OOoCon 2004
Digital Signiture
Digital signature introduction
Digital signature
PKI_Applications digital certificate.ppt
Security everywhere digital signature and digital fingerprint v1 (personal)
Digital signature
CGI White Paper - Key Incryption Mechanism
Extra unit 2
Ad

More from Apurv Gourav (18)

PPTX
Bihar foundation Pune Chapter
PPT
Leadership
PPS
Cyber Pollution
PPT
Foreign Direct Investment In India
PPT
ECB & FCCB
PPT
NON PERFORMING ASSETS (NPA)
PPT
cotton commodity
PPT
Comparative analysis of power and infrastructure sector
PPT
Contract Farming
PPT
Jagriti I
PPT
Bihar_SWOT Analysis
PPT
Cafe Coffee Day
PPT
ERP Implementation Life Cycle
PPT
CORPORATE COMMUNICATON SKILLS
PPT
Analytical Crm
PPT
venture capital
PPT
Various general insurance companies and its policies
PPT
Fight against AIDS
Bihar foundation Pune Chapter
Leadership
Cyber Pollution
Foreign Direct Investment In India
ECB & FCCB
NON PERFORMING ASSETS (NPA)
cotton commodity
Comparative analysis of power and infrastructure sector
Contract Farming
Jagriti I
Bihar_SWOT Analysis
Cafe Coffee Day
ERP Implementation Life Cycle
CORPORATE COMMUNICATON SKILLS
Analytical Crm
venture capital
Various general insurance companies and its policies
Fight against AIDS

Recently uploaded (20)

PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
5 Stages of group development guide.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
COST SHEET- Tender and Quotation unit 2.pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Types of control:Qualitative vs Quantitative
PDF
WRN_Investor_Presentation_August 2025.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
Unit 1 Cost Accounting - Cost sheet
Chapter 5_Foreign Exchange Market in .pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Power and position in leadershipDOC-20250808-WA0011..pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Roadmap Map-digital Banking feature MB,IB,AB
5 Stages of group development guide.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Nidhal Samdaie CV - International Business Consultant
COST SHEET- Tender and Quotation unit 2.pdf
Euro SEO Services 1st 3 General Updates.docx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
ICG2025_ICG 6th steering committee 30-8-24.pptx
Probability Distribution, binomial distribution, poisson distribution
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Types of control:Qualitative vs Quantitative
WRN_Investor_Presentation_August 2025.pdf

Digital signatures

  • 2. Electronic Record Very easy to make copies Very fast distribution Easy archiving and retrieval Copies are as good as original Easily modifiable Environmental Friendly Because of 4 & 5 together, these lack authenticity
  • 3. Why Digital Signatures? To provide Authenticity, Integrity and Non-repudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 4. Encryption Caesar Cipher The shift is linear and equidistributed 3 changes I agree lcdjuhh Key Cipher The shift is linear (cyclic) 269 k.n.gupta 62 mewam3rzjba i+3=l Space=c [+3] k+2=m (dot)=e [+6] n=w [+9]
  • 5. ENCRYPTION Message 2 The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 DECRYPTION Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 2 The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce. Same Key SYMMETRIC Different Keys [Keys of a pair – Public and Private] ASYMMETRIC [PKI]
  • 6.  
  • 7. Digital Signatures Digital Signatures are numbers Same Length – 40 digits They are document content dependent I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 These are digital signatures of same person on different documents
  • 8. Concepts A 1024 bits number is a very big number much bigger than the total number of electrons in whole world. Trillions of Trillions of pairs of numbers exist in this range with each pair having following property A message encrypted with one element of the pair can be decrypted ONLY by the other element of the same pair Two numbers of a pair are called keys, the Public Key & the Private Key. User himself generates his own key pair on his computer Any message irrespective of its length can be compressed or abridged uniquely into a smaller length message called the Digest or the Hash. Smallest change in the message will change the Hash value Click for Hash Generation
  • 9. What is Digital Signature? Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature
  • 10. Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner ] Private Key – Used for making digital signature Public Key – Used to verify the digital signature
  • 11. RSA Key pair (including Algorithm identifier) [2048 bit] Private Key 3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83 463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e a146 2840 8102 0301 0001 Public Key 3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04de 45de af46 2240 8410 02f1 0001
  • 12. RCAI PUBLIC KEY [Including Algorithm Identifier] RSA – 2048 bit 3082 010a 0282 0101 00aa d454 b97c 73bf 177a 0b2f 85ab 0738 3d76 8637 980c c815 52de 2fc6 9d09 3548 9c75 1dbe c705 3ad1 cfc7 db51 033c ebf6 a367 d693 b669 29b8 c147 851a b4f9 f1e4 e361 e1e8 91ea 8283 fe2f f3d4 7fdd fbb7 d761 ebb0 4cee 41e3 6e8d 3cd9 4ae0 569c 4270 9c5a 8725 cff7 bf2a b079 cb09 de1d 22e7 0bcc 800b 6118 fa28 963f d1c6 86c1 75b2 8f80 ff5c 83a7 7310 1f03 db26 1639 61cf db36 3a2b e5a5 8aa8 c9d6 c10d 5d03 b274 b36e 1c90 d8bc d561 9278 a3d7 146f 7006 f386 8cc6 3fae 5e99 b071 7f23 fcaa 4853 e2ff 5561 5bc8 1747 42f2 c180 79fe 7d74 0ea8 4550 69e0 e0e9 d91d 75a4 c144 6211 de1f 0a0d b295 9831 8c99 ae7e 5e0e da89 0f84 14d7 5b80 373f 57cc 70ec 7232 0502 0301 0001 This key is available at cca.gov.in and can be downloaded
  • 13. Signed Messages Message + Signature Hash Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key Message + signature COMPARE Calculated Hash Message Sender Receiver Sent thru’ Internet if OK Signatures verified Hash Signed Message
  • 14. Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free
  • 15. Demonstration… Key Generation Random Numbers RSA Key Pair [Private/Public Key] Digital Signature Generate Message Digest [SHA1] Encrypting Digest using Private Key [Signatures] Attaching the Signatures to the message. Verification of Signatures Run the test for Authentication, Integrity and Non repudiation. Digital Signature Certificate ITU X.509 v3
  • 16. Private key protection The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. The key is secured using PIN Protected soft token Smart Cards Hardware Tokens
  • 17. PIN protected soft tokens The Private key is encrypted and kept on the Hard Disk in a file, this file is password protected. This forms the lowest level of security in protecting the key, as The key is highly reachable. PIN can be easily known or cracked. Soft tokens are also not preferred because The key becomes static and machine dependent. The key is in known file format.
  • 18. Smart Cards The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system. (Having smart card reader)
  • 19. Hardware Tokens They are similar to smart cards in functionality as Key is generated inside the token. Key is highly secured as it doesn’t leave the token. Highly portable. Machine Independent. iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
  • 20. Smart Card iKey Hardware Tokens Biometrics – adds another level of security to these tokens
  • 21.  
  • 22. Public Key Infrastructure (PKI) Some Trusted Agency is required which certifies the association of an individual with the key pair. Certifying Authority (CA) This association is done by issuing a certificate to the user by the CA Public key certificate (PKC) All public key certificates are digitally signed by the CA
  • 23. Certifying Authority Must be widely known and trusted Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates revoked Displays online the license issued by the Controller Displays online approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and Guidelines Must be widely known and trusted Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates revoked Displays online the license issued by the Controller Displays online approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and Guidelines
  • 25. Public-Key Certification Signed by using CA’s private key User Name & other credentials User’s Public key User Certificate Certificate Database Publish Certificate Request Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No.
  • 26. Click for certificate generation demo Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key More than one person are required for signing HSM is housed in a strong room with video surveillance on 24x7 basis.
  • 27. Trust Path Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs) Controller certifies the association of CA with his public key Certifying Authority (CA) is the trusted authority responsible for creating or certifying identities. CA certifies the association of an individual with his public key
  • 28. Role of controller Controller of Certifying Authorities as the “Root” Authority certifies the technologies,infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 29. Four CAs has been licensed Safescrypt 5 th Feb 2002 A subsidiary of Satyam Infoway National Informatics Center (NIC) 17 th July 2002 Govt. of India Institute for Development & Research in Banking Technology (IDRBT) 6 th August 2002 A society of Reserve Bank of India Tata Consultancy Services (TCS) 9 th September 2002 Charges of certificates varies from Rs. 500/- to Rs. 20,000/- per year
  • 30. Summary Each individual has a pair of keys Public key of each individual is certified by a CA (Certifying Authority) Public keys of CAs are certified by the Controller Public key of the Controller is self certified Public keys of everyone are known to all concerned and are also available on the web Certification Practice Statement is displayed on the web site
  • 31. Applications in Judiciary Instant posting of judgment on the web. Secured electronic communications within judiciary Authentic archiving of Judicial records Submission of affidavits Giving certified copies of the Judgment
  • 32. Applications in Telecommunications Subscribers Subscriber’s services management STD/ISD, Opening, Closing, Initializing Password Shifting of telephones, Accessories (Clip, Cordless) Small Payments through telephones bills Books, gifts, Internet purchases Mobile Authentication of SMS Share market trading, Intra/Inter office instructions Mobile Phones as Credit cards Mobile operator can venture into credit card business
  • 33. Applications in Telecommunications (contd.) Internal Intra/Inter offices authentic communications OBs, approvals, Instructions, requests Procurement of material Calling/Receiving bids, Purchase orders, Payment instructions Network Management functions Change of configuration, Blocking/unblocking routes
  • 34. Public Key Cryptography Encryption Technologies Document Document Encrypted Document Encrypted Document Public Key of B Confidentiality Private Key of B
  • 35. E-Governance Empowering Citizens Transparency Accountability Elimination of Intermediatory Encouraging Citizens to exercise their Rights
  • 36. Government Online Issuing forms and licences Filing tax returns online Online Government orders/treasury orders Registration Online file movement system Public information records E-voting Railway reservations & ticketing E-education Online money orders

Editor's Notes

  • #4: One cd rom=one tree