SlideShare a Scribd company logo
PRESENTED BY:
                ANKITA DAVE
                              1
SR.NO.                     TOPIC                        SLIDE NO.
  1.     WHAT IS DIGITAL SIGNATURES?                        4
  2.     WHY DIGITAL SIGNATURES?                            5
  3.     PAPER SIGNATURES VS DIGITAL SIGNATURES             6
  4.     PRIVATE KEY & PUBLIC KEY                           7
  5.     PROTECTION OF PRIVATE KEY                          8
  6.     WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)?       9
  7.     CERTIFICATION AUTHORITY (CA)                      10
  8.     HOW DOES DIGITAL SIGNATURES WORKS?                11
  9.     PROCEDURE TO OBTAIN DSC                           12

                                                                    2
SR.NO.                      TOPIC                        SLIDE NO.
  10.    STEP 1: DOWNLOADING ROOT CERTIFICATE               13
  11.    STEP 2: SELECTING A CERTIFYING AUTHORITY           18
  12.    STEP 3: VISIT THE WEBSITE OF THE CA                19
  13.    CLASS- 1 CERTIFICATES                              20
  14.    CLASS- 2 CERTIFICATES                              21
  15.    CLASS- 3 CERTIFICATES                              22
  16.    STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED      23
  17.    STEP 5: SUBMIT AN ONLINE REQUEST                   24
  18.    CONCLUSION                                         29
  19.    SOURCES OF INFORMATION                             30
                                                                     3
   As per Information Technology
    Act 2000, digital signature
    means authentication of any
    electronic record by means of
    an electronic.
   Simply, signature in digital form
                OR
    Mark to authenticate a
    document.
                                        4
   Authentification.
   Integrity.
   Low cost.
   Eliminates the use of paper.
   Faster procedures.
   Completely secure.




                                   5
PARAMETER           PAPER             DIGITAL

Authenticity      May be forged    Can not be copied
Integrity         Signature        Signature depends
                  independent of   on the contents of
                  the document     the document
Non-repudiation   a. Handwriting   a. Any computer
                     expert needed    user
                  b. Error prone   b. Error free
                                                        6
Each individual generates his own key pair.

  PRIVATE KEY              PUBLIC KEY


     Known only to              Known to
        owner                   everyone

    Used for making           Used to verify
    digital signature        digital signature

                                                 7
The private key generated is to be protected &
 kept in secret because
   Can be misused by anyone who is having
    access to your computer system.
   Is lost if computer system is formatted or
    internet explorer is changed.
 The key is secured using



                                                  8
Is an electronic means of establishing records
 when doing transactions on the Internet.
Are easily transportable and cannot be imitated.
Contains details like owner’s name & public
 key, expiration date of public, serial number &
 name of the issuer (the Certification Authority) &
 his digital signature.
It is issued so that Recipient can verify that the
 certificate is authentic.
                                                 9
SR. NO. NAMES OF CA             WEBSITES
  1.   NIC              nicca.nic.in
  2.   GNFC             www.ncodesolutions.com
  3.   SAFESCRYPT       www.safescrypt.com
  4.   TCS              www.tcs-ca.tcs.co.in
  5.   MTNL TRUSTLINE   www.mtnltrustline.com
  6.   IDRBT            www.idrbtca.org.in
  7.   E-MUDHRA         www.e-Mudhra.com




                                                 10
11
DOWNLOADING ROOT CERTIFICATE

    SELECTING A CERTIFYING AUTHORITY

VISIT THE WEBSITE OF CERTIFYING AUTHORITY

  SELECT THE TYPE OF CERTIFICATE NEEDED

       SUBMIT AN ONLINE REQUEST


                                            12
Visit the website of the Controller of Certifying
       Authorities (CCA) at www.cca.gov.in.




                                                    13
14
15
16
17
 Visit the website of the CCA at www.cca.gov.in
 to obtain a list of licensed Certifying Authorities
 in India.
 Based on information and study of the relevant
 websites, select a Certifying Authority.
  Example: TCS official website is
 www.tcs-ca.tcs.co.in.



                                                   18
A visit to the select CA website provides
  following three types of digital signature
  certificates:
CLASSES OF DSC:
 Class-1 certificates
 Class-2 certificates
 Class-3 certificates.

                                               19
 These Certificates are personal e-mail
 Certificates that allows you to secure your email
 messages. These certificates can be used to:
 1. Digitally sign email.
 2. Encrypt email.
 3. Authenticate to Web Servers.
 These certificates, however, do not facilitate
 strong authentication of the identity of the
 subscriber and hence, cannot be relied upon
 where proof of identity is required (commercial
 use).                                           20
   These Certificates are issued as Managed Digital
    Certificates to employees/ partners/ affiliates/
    customers of business and government
    organizations that are ready to assume the
    responsibility of verifying the accuracy of the
    information submitted by their employees/
    partners/ affiliates/ customers.
   These certificates issued under the TCS-CA Trust
    Network are legally valid under the Indian IT Act
    2000.
                                                    21
   These Certificates are issued to individuals,
    companies and government organizations.
   They can be used both for personal and
    commercial purposes.
   They are typically used for electronic commerce
    applications where security is a major concern.
   These Certificates issued by the TCS-CA are
    legally valid under Indian IT Act 2000.


                                                  22
We need a legally valid digital signature
certificate for an individual. The relevant
certificate is a class-3 certificate.




                                              23
The next step is to create a user account on the
TCS CA website, complete an online enrollment
form and generate a cryptographic key pair on
our computer.




                                               24
25
26
27
28
Hence, we can conclude that digital signatures:
Minimizes the risk of dealing with imposters.
Minimizes the risk of undetected message
 tampering and forgery.
Retains a high degree of information security.




                                                  29
asclonline.com/images/d/d4/Simple_Guide_to_
 Digital_Signatures.pdf
www.youdzone.com/signature.html
en.wikipedia.org/wiki/Digital_signatures
www.cca.gov.in
esolutions.net.in/digitalsignatures.html
nsdl.co.in/business/cirRec_18Mar08.doc



                                           30
Digital signature 3

More Related Content

PDF
Flyer Letter Gen Vasco
PDF
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
PDF
Apache Milagro Presentation at ApacheCon Europe 2016
PDF
Two factor authentication-in_your_network_e_guide
PDF
Sms passcode
PDF
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
PPT
Ynamono Hs Lecture
PPSX
Flyer Letter Gen Vasco
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
Apache Milagro Presentation at ApacheCon Europe 2016
Two factor authentication-in_your_network_e_guide
Sms passcode
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ynamono Hs Lecture

What's hot (20)

PDF
Online Secure payment System using shared Images
PDF
TrustBearer - CTST 2009 - OpenID & Strong Authentication
PDF
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
PPTX
Getting Started With WebAuthn
PPT
Overall cryptography and pki introduction
PDF
iot hacking, smartlockpick
PDF
Mobile Cloud Identity
PPTX
FrontOne our new and different solutions
PPTX
Implementing MITREid - CIS 2014 Presentation
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
Securing corporate assets_with_2_fa
PDF
2 factor authentication 3 [compatibility mode]
PDF
PKI Interoperability
PDF
To Increase Downloads, Instill Trust First WP
DOCX
Digital signature
PPSX
iKeyPass...Unbreakable Password Security
PDF
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
PDF
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PDF
Autdsi gvi
PDF
NetIQ Customer Success Story - a2a
Online Secure payment System using shared Images
TrustBearer - CTST 2009 - OpenID & Strong Authentication
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
Getting Started With WebAuthn
Overall cryptography and pki introduction
iot hacking, smartlockpick
Mobile Cloud Identity
FrontOne our new and different solutions
Implementing MITREid - CIS 2014 Presentation
Stronger/Multi-factor Authentication for Enterprise Applications
Securing corporate assets_with_2_fa
2 factor authentication 3 [compatibility mode]
PKI Interoperability
To Increase Downloads, Instill Trust First WP
Digital signature
iKeyPass...Unbreakable Password Security
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Autdsi gvi
NetIQ Customer Success Story - a2a
Ad

Similar to Digital signature 3 (20)

PPTX
Digital signature 2
PPT
E collaborationscottrea
PDF
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
PPTX
Digital signatures
PPT
Digital Signature.ppt power ponit presentation
PPT
Presentation on digital signatures & digital certificates
DOC
IT Act,2000
PPT
Digital signature
PPT
Digital signature Brief Introduction
PPTX
Digital signature and certificate authority
PPTX
Digital certificates
PPT
What is Digital Signature, Digital Signature FAQ - eMudhra
PPTX
Digital signature & PKI Infrastructure
PPT
Information technology-act 2000- an overview-sethassociatesppt
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
PPT
Digital certificates
PPT
open house electronic environment IT Act
PDF
Compliance & Value of Digital Signatures
PPT
Digital signature introduction
Digital signature 2
E collaborationscottrea
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
Digital signatures
Digital Signature.ppt power ponit presentation
Presentation on digital signatures & digital certificates
IT Act,2000
Digital signature
Digital signature Brief Introduction
Digital signature and certificate authority
Digital certificates
What is Digital Signature, Digital Signature FAQ - eMudhra
Digital signature & PKI Infrastructure
Information technology-act 2000- an overview-sethassociatesppt
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & personal digital certificates, securing sensitive electronic communicat...
Digital certificates
open house electronic environment IT Act
Compliance & Value of Digital Signatures
Digital signature introduction
Ad

Recently uploaded (20)

PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Lesson notes of climatology university.
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Trump Administration's workforce development strategy
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Yogi Goddess Pres Conference Studio Updates
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
Lesson notes of climatology university.
Weekly quiz Compilation Jan -July 25.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Trump Administration's workforce development strategy
A systematic review of self-coping strategies used by university students to ...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Digital signature 3

  • 1. PRESENTED BY: ANKITA DAVE 1
  • 2. SR.NO. TOPIC SLIDE NO. 1. WHAT IS DIGITAL SIGNATURES? 4 2. WHY DIGITAL SIGNATURES? 5 3. PAPER SIGNATURES VS DIGITAL SIGNATURES 6 4. PRIVATE KEY & PUBLIC KEY 7 5. PROTECTION OF PRIVATE KEY 8 6. WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)? 9 7. CERTIFICATION AUTHORITY (CA) 10 8. HOW DOES DIGITAL SIGNATURES WORKS? 11 9. PROCEDURE TO OBTAIN DSC 12 2
  • 3. SR.NO. TOPIC SLIDE NO. 10. STEP 1: DOWNLOADING ROOT CERTIFICATE 13 11. STEP 2: SELECTING A CERTIFYING AUTHORITY 18 12. STEP 3: VISIT THE WEBSITE OF THE CA 19 13. CLASS- 1 CERTIFICATES 20 14. CLASS- 2 CERTIFICATES 21 15. CLASS- 3 CERTIFICATES 22 16. STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED 23 17. STEP 5: SUBMIT AN ONLINE REQUEST 24 18. CONCLUSION 29 19. SOURCES OF INFORMATION 30 3
  • 4. As per Information Technology Act 2000, digital signature means authentication of any electronic record by means of an electronic.  Simply, signature in digital form OR Mark to authenticate a document. 4
  • 5. Authentification.  Integrity.  Low cost.  Eliminates the use of paper.  Faster procedures.  Completely secure. 5
  • 6. PARAMETER PAPER DIGITAL Authenticity May be forged Can not be copied Integrity Signature Signature depends independent of on the contents of the document the document Non-repudiation a. Handwriting a. Any computer expert needed user b. Error prone b. Error free 6
  • 7. Each individual generates his own key pair. PRIVATE KEY PUBLIC KEY Known only to Known to owner everyone Used for making Used to verify digital signature digital signature 7
  • 8. The private key generated is to be protected & kept in secret because  Can be misused by anyone who is having access to your computer system.  Is lost if computer system is formatted or internet explorer is changed.  The key is secured using 8
  • 9. Is an electronic means of establishing records when doing transactions on the Internet. Are easily transportable and cannot be imitated. Contains details like owner’s name & public key, expiration date of public, serial number & name of the issuer (the Certification Authority) & his digital signature. It is issued so that Recipient can verify that the certificate is authentic. 9
  • 10. SR. NO. NAMES OF CA WEBSITES 1. NIC nicca.nic.in 2. GNFC www.ncodesolutions.com 3. SAFESCRYPT www.safescrypt.com 4. TCS www.tcs-ca.tcs.co.in 5. MTNL TRUSTLINE www.mtnltrustline.com 6. IDRBT www.idrbtca.org.in 7. E-MUDHRA www.e-Mudhra.com 10
  • 11. 11
  • 12. DOWNLOADING ROOT CERTIFICATE SELECTING A CERTIFYING AUTHORITY VISIT THE WEBSITE OF CERTIFYING AUTHORITY SELECT THE TYPE OF CERTIFICATE NEEDED SUBMIT AN ONLINE REQUEST 12
  • 13. Visit the website of the Controller of Certifying Authorities (CCA) at www.cca.gov.in. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.  Visit the website of the CCA at www.cca.gov.in to obtain a list of licensed Certifying Authorities in India.  Based on information and study of the relevant websites, select a Certifying Authority. Example: TCS official website is www.tcs-ca.tcs.co.in. 18
  • 19. A visit to the select CA website provides following three types of digital signature certificates: CLASSES OF DSC:  Class-1 certificates  Class-2 certificates  Class-3 certificates. 19
  • 20.  These Certificates are personal e-mail Certificates that allows you to secure your email messages. These certificates can be used to: 1. Digitally sign email. 2. Encrypt email. 3. Authenticate to Web Servers.  These certificates, however, do not facilitate strong authentication of the identity of the subscriber and hence, cannot be relied upon where proof of identity is required (commercial use). 20
  • 21. These Certificates are issued as Managed Digital Certificates to employees/ partners/ affiliates/ customers of business and government organizations that are ready to assume the responsibility of verifying the accuracy of the information submitted by their employees/ partners/ affiliates/ customers.  These certificates issued under the TCS-CA Trust Network are legally valid under the Indian IT Act 2000. 21
  • 22. These Certificates are issued to individuals, companies and government organizations.  They can be used both for personal and commercial purposes.  They are typically used for electronic commerce applications where security is a major concern.  These Certificates issued by the TCS-CA are legally valid under Indian IT Act 2000. 22
  • 23. We need a legally valid digital signature certificate for an individual. The relevant certificate is a class-3 certificate. 23
  • 24. The next step is to create a user account on the TCS CA website, complete an online enrollment form and generate a cryptographic key pair on our computer. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. Hence, we can conclude that digital signatures: Minimizes the risk of dealing with imposters. Minimizes the risk of undetected message tampering and forgery. Retains a high degree of information security. 29