SlideShare a Scribd company logo
Digital Signatures

RAVI JAIN
MET - DBM
Electronic Record
1. Very easy to make copies
2. Very fast distribution
3. Easy archiving and retrieval
4. Copies are as good as original
5. Easily modifiable
6. Environmental Friendly
Because of 4 & 5 together, these lack authenticity
Why Digital Signatures?
• To provide Authenticity,
Integrity and Non
-repudiation to electronic
documents
• To use the Internet as the
safe and secure medium
for e-Governance and eCommerce
What is Digital Signature?
 A digital signature is an electronic signature that can be used
to authenticate the identity of the sender of a message or the
signer of a document, and possibly to ensure that the original
content of the message or document that has been sent is
unchanged.
 Digital signatures are easily transportable, cannot be imitated
by someone else, and can be automatically time-stamped. The
ability to ensure that the original signed message arrived
means that the sender can not easily repudiate it later.
 The originator of a message uses a signing key (Private Key) to
sign the message and send the message and its digital signature
to a recipient
 The recipient uses a verification key (Public Key) to verify the
origin of the message and that it has not been tampered with
while in transit
Digital signatures employ a type of Asymmetric
Cryptography. The Scheme typically consists of
three Algorithms
 A key generation algorithm that selects a private key
uniformly at random from a set of possible private
keys. The algorithm outputs the private key and a
corresponding public key.
 A signing algorithm that, given a message and a
private key, produces a signature.
 A signature verifying algorithm that, given a message,
public key and a signature, either accepts or rejects
the message's claim to authenticity

Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document
Digital Signatures
Each individual generates his own key pair
[Public key known to everyone
&
Private key only to the owner]

Private Key – Used for making Digital Signature
Public Key – Used to verify the Digital Signature
Hardware Tokens

iKey

Smart Card
Smart Cards
•

The Private key is generated
in the crypto module residing
in the smart card.

•

The key is kept in the
memory of the smart card.

•

The key is highly secured as it
doesn’t leave the card, the
message digest is sent inside
the card for signing, and the
signatures leave the card.

•

The card gives mobility to the
key and signing can be done
on any system (Having smart
card reader).
iKeys or USB Tokens
•

They are similar to smart cards in
functionality as
– Key is generated inside the
token.
– Key is highly secured as it doesn’t
leave the token.
– Highly portable.
– Machine Independent.

•

iKEY is one of the most commonly
used token as it doesn’t need a
special reader and can be connected
to the system using USB port.
Private Key Protection
•

The Private key generated
is to be protected and kept
secret. The responsibility
of the secrecy of the key
lies with the owner.

•

The key is secured using
– PIN Protected soft token
– Smart Cards
– Hardware Tokens
Digital Signatures
I agree

efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.

fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.

0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.

ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.

01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents

• Digital Signatures are numbers
• Same Length – 40 digits
• They are document content dependent
Paper Signatures V/s Digital Signatures
Parameter

Paper

Electronic

Authenticity
V/s

May be forged

Integrity

Signature
Signature depends
independent of the on the contents of
document
the document

Nonrepudiation

a.
b.

Can not be copied

Handwriting a.
expert needed
Error prone
b.

Any computer
user
Error free
Role of Controller (CCA)
Controller of Certifying Authorities as
the “Root” Authority certifies the
technologies, infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
Seven CAs have been licensed by CCA
 Safescrypt
 National Informatics Center (NIC), Government of
India
 Institute for Development & Research in Banking
Technology (IDRBT) – A Spciety of Reserve Bank of
India
 Tata Consultancy Services (TCS)
 MTNL Trustline
 GNFC (Gujarat Narmada Fertilizer Corporation)
 E-MudhraCA
Thank You

More Related Content

PPTX
Digital signature
PDF
Digital signatures
PPT
Digital signature
PPTX
Digital signature
PPTX
Seminar ppt on digital signature
PPTX
Digital signature 2
PPTX
Digital signature
PPTX
Digital certificates
Digital signature
Digital signatures
Digital signature
Digital signature
Seminar ppt on digital signature
Digital signature 2
Digital signature
Digital certificates

What's hot (20)

PPTX
Digital signature
PPT
Digital Signature
PPTX
Digital signature
PPTX
Digital signature(Cryptography)
PPTX
Cryptography
PPT
Digital Signature
PPT
Digital Signature
PPTX
NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Digital signature Brief Introduction
PPT
Digital signature
PPTX
Network Security and Firewall
PPTX
Cryptography
PPT
Key management.ppt
PPTX
CYBER SECURITY : DIGITAL SIGNATURE,
PPTX
Key management
PPTX
Digital signature & certificate
PDF
Introduction to Cryptography
PDF
Email security presentation
PPTX
Cryptography
Digital signature
Digital Signature
Digital signature
Digital signature(Cryptography)
Cryptography
Digital Signature
Digital Signature
NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Digital signature Brief Introduction
Digital signature
Network Security and Firewall
Cryptography
Key management.ppt
CYBER SECURITY : DIGITAL SIGNATURE,
Key management
Digital signature & certificate
Introduction to Cryptography
Email security presentation
Cryptography
Ad

Viewers also liked (10)

DOCX
Cryptography using artificial neural network
PPT
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
PPTX
Electronic Records and Signatures
PPTX
Digital Signatures
PPT
Digital signatures
PPTX
Digital Signatures
PPTX
Message Authentication using Message Digests and the MD5 Algorithm
PPT
Digital signature introduction
PPT
Dsa & Digi Cert
PPTX
What is Electronic Records Management?
Cryptography using artificial neural network
Electronic Health Records - Privacy Concerns, by Phil Booth (National Coordin...
Electronic Records and Signatures
Digital Signatures
Digital signatures
Digital Signatures
Message Authentication using Message Digests and the MD5 Algorithm
Digital signature introduction
Dsa & Digi Cert
What is Electronic Records Management?
Ad

Similar to DIGITAL SIGNATURE (20)

PPT
Introduction to Digital signature Basic Fundamentals
PPT
Digital signatures
PPT
Digital Signature.ppt power ponit presentation
PPTX
Digital signature
PPT
Digital signature service in noida
PPT
Digital signature
PPTX
Digital signature & PKI Infrastructure
PPT
Digital signature online - What is digital signature
PPT
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
PPT
ccapresentation.ppt
PDF
seminar-151029231027-lva1-app6892.pdf
PPT
PKI and Applications
PPTX
Digital Signature
DOCX
Digital signature
PPTX
Digital signature
PPTX
Digital signatur
PPT
Presentation on digital signatures & digital certificates
PPTX
digital signature ppt
PPTX
Digital Signature.pptx
Introduction to Digital signature Basic Fundamentals
Digital signatures
Digital Signature.ppt power ponit presentation
Digital signature
Digital signature service in noida
Digital signature
Digital signature & PKI Infrastructure
Digital signature online - What is digital signature
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
ccapresentation.ppt
seminar-151029231027-lva1-app6892.pdf
PKI and Applications
Digital Signature
Digital signature
Digital signature
Digital signatur
Presentation on digital signatures & digital certificates
digital signature ppt
Digital Signature.pptx

More from ravijain90 (6)

PPT
Android
PPT
Artificial intelligence
PPTX
Linkedin but why
PPT
Cyber laws and patents
PPT
why skype is useful
PPTX
Affiliate marketng
Android
Artificial intelligence
Linkedin but why
Cyber laws and patents
why skype is useful
Affiliate marketng

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx

DIGITAL SIGNATURE

  • 2. Electronic Record 1. Very easy to make copies 2. Very fast distribution 3. Easy archiving and retrieval 4. Copies are as good as original 5. Easily modifiable 6. Environmental Friendly Because of 4 & 5 together, these lack authenticity
  • 3. Why Digital Signatures? • To provide Authenticity, Integrity and Non -repudiation to electronic documents • To use the Internet as the safe and secure medium for e-Governance and eCommerce
  • 4. What is Digital Signature?  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit
  • 5. Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document
  • 6. Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature
  • 8. Smart Cards • The Private key is generated in the crypto module residing in the smart card. • The key is kept in the memory of the smart card. • The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. • The card gives mobility to the key and signing can be done on any system (Having smart card reader).
  • 9. iKeys or USB Tokens • They are similar to smart cards in functionality as – Key is generated inside the token. – Key is highly secured as it doesn’t leave the token. – Highly portable. – Machine Independent. • iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.
  • 10. Private Key Protection • The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. • The key is secured using – PIN Protected soft token – Smart Cards – Hardware Tokens
  • 11. Digital Signatures I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 • These are digital signatures of same person on different documents • Digital Signatures are numbers • Same Length – 40 digits • They are document content dependent
  • 12. Paper Signatures V/s Digital Signatures Parameter Paper Electronic Authenticity V/s May be forged Integrity Signature Signature depends independent of the on the contents of document the document Nonrepudiation a. b. Can not be copied Handwriting a. expert needed Error prone b. Any computer user Error free
  • 13. Role of Controller (CCA) Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 14. Seven CAs have been licensed by CCA  Safescrypt  National Informatics Center (NIC), Government of India  Institute for Development & Research in Banking Technology (IDRBT) – A Spciety of Reserve Bank of India  Tata Consultancy Services (TCS)  MTNL Trustline  GNFC (Gujarat Narmada Fertilizer Corporation)  E-MudhraCA

Editor's Notes

  • #4: One cd rom=one tree