Electronic and Digital Signature
Electronic and Digital Signature
Electronic and Digital Signature
DESCRIPTION OF MODULE
The reader shall be able to understand the concept and need for digital signature
and electronic signature in India in the context of authentication of digital
communications and transactions.
1. Introduction:
With the advancement of Information and Communication Technologies
especially “Internet” as a premier marketplace and transaction place, the
concern of security for billions of bytes of information and privacy is not a small
thing. Digital Signature as a security tool for such purposes provides some level
of assurance, trust to both the receiver and sender.
1
The Information Technology Act, 2000.
2
Available at <http://www.oxfordlearnersdictionaries.com/definition/english/signature>visited on
10/10/14
2. From Handwritten/Physical Signature to Digital Signature:
Signature is used to pinpoint the signer; it’s a proof of his personal attention for
the document he signed and to incur some legal rights, duties and liabilities it is
used. In past, when technology was not advanced, business transactions,
contracts were carried out in offline medium but with the advancement in the
technology, contracts, businesses are now being conducted in online medium as
well. But the problem was how to sign a electronic document or digital
transaction?Here the need for some suitable technology was felt that can work in
the similar fashion as it was working in offline medium. Technology that evolved
is termed as“Digital Signature”.
3
According to Section 2 (1)(x) of the Information Technology Act, 2000, a "key pair", in an
asymmetric crypto system, means a private key and its mathematically related public key, which are
so related that the public key can verify a digital signature created by the private key
4
According to Section 2 (1)(t) of the Information Technology Act,2000- "electronic record" means
data, record or data generated, image or sound stored, received or sent in an electronic form or micro
film or computer generated micro fiche
confirms that the sender (originator) approved the content of that electronic
record, any attempt to change the content of the record must be seen to be
incompatible with the signature.
5
"digital signature" means authentication of any electronic record by a subscriber by means of an
electronic method or procedure in accordance with the provisions of section 3;
6
Authentication of electronic records.
(1) Subject to the provisions of this section any subscriber may authenticate an electronic record by
affixing his digital signature.
(2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system
and hash function which envelop and transform the initial electronic record into another electronic
record.
Explanation- For the purposes of this sub-section, "hash function" means an algorithm mapping or
translation of one sequence of bits into another, generally smaller, set known'as "hash result" such that
an electronic record yields the same hash result every time the algorithm is executed with the same
electronic record as its input making it
computationally infeasible-
(a) to derive or reconstruct the original electronic record from the hash result produced by the
algorithm;
(b) That two electronic records can produce the same hash result using the algorithm.
(3) Any person by the use of a public key of the subscriber can verify the electronic record.
(4) The private key and the public key are unique to the subscriber and constitute a functioning key
pair
7Section 5 of the Information Technology Act,2000: Legal recognition of Electronic Signature:
Where any law provides that information or any other matter shall be authenticated by affixing
the signature or any document should be signed or bear the signature of any person then,
notwithstanding anything contained in such law, such requirement shall be deemed to have been
satisfied, if such information or matter is authenticated by means of digital signature affixed in
such manner as may be prescribed by the Central Government.
Explanation -
For the purposes of this section, "Signed", with its grammatical variations and cognate
expressions, shall, with reference to a person, mean affixing of his hand written signature or any
mark on any document and the expression "Signature" shall be construed accordingly.
8
Electronic signatureis a wider term which includes digital signature.
Public Key Infrastructure (PKI): Digital Signature is based upon Public Key
Infrastructure that allows you to transfer your data or documents securely and
secretly over an untrusted channel with the use of public and private key pair
obtained through an authority. PKI also performs administrative work for Digital
Signature certificates that involves- generating, issuing, maintaining, and
revoking of public key certificates. PKI is a trust model that broadly covers two
approach; Hierarchal Approach and Mesh or Cross Certification Approach.
Hierarchal Approach: In this approach trust starts from Root CA 9 i.e., Controller
of Certifying Authorities then it flows down to end entities i.e., users through a
chain of Certifying Authorities (CAs).
CCA
CA1 CA2
CA3 CA4
Cross Certification Approach: In this approach, trust flows between the Root CA of
different networks. Suppose we have two networks; Network ‘1’ which is of India
and Network ‘2’ which is of Japan. If Root CA of network ‘1’ wants to cross certify
the network ‘2’ then it will communicate to the Root CA of network ‘2’ and vice-
9
Controller Certifying Authority of (CCA) is the Root Certifying Authority of India (RCAI)
versa. In simple words, cross certification is a process which is established
between the Root Certifying Authority of two or more countries.
NETWORK 1 NETWORK 2
(INDIA) (JAPAN)
CCA CCA
Digital signature is nothing but a block of data that may consist of alphabets,
numeric, special characters or mixture of all. Digital Signature technology uses
asymmetric key crypto system for the authentication purpose as stated under
section 3 of the Information Technology Act, 2000-
Subscriber (In whose name Electronic Signature Certificate has been issued)
may authenticate Electronic Record by way of affixing Digital Signature.
Authentication process must involve use of asymmetric crypto system and
hash function10.
10
Hash Function- An algorithm that maps or translates one set of bits into another (generally smaller)
set in such a way that-
(i)A message yields the same result every time the algorithm is executed using the same message as
input.
(ii)It is computationally infeasible for a message to be derived or reconstituted from the result produced
by the algorithm.
Public Key and Private Key is unique key pair associated with the subscriber,
any person may verify the Electronic Record by making use of Public Key of
the subscriber.
Asymmetric crypto system: It is defined in section 2 (1) (f)under Information
Technology Act, 2000 as a system of secure key pair consisting of a Private Key
for creating a Digital Signature and Public Key to verify the Digital Signature.
Asymmetric key cryptography has various advantages - Firstly, you need not to
share your keys in advance, the only key that you need to share with other party
is your Public Key. Secondly, only the party which is creating the digital signature
needs to secure the keys. To create a Digital Signature one must understand
following terms:
Encryption: A technique by which Plain text is converted into Cipher text.
Decryption: A technique by which Cipher text is converted into Plain text.
Private Key: as defined in section 2(1) (zc) under IT Act, 2000, means the key of a
key pair used to create a Digital Signature;
Public Key: as defined in section 2(1) (zd) under IT Act, 2000, means the key of a
key pair used to verify a digital signature and listed in the Digital Signature
Certificate.
Signer: One who creates Digital Signature.
Recipient: One who verifies the Signature.
Hash Function: As discussed above.
(iii)It is computationally infeasible to find two different messages that produce the same hash result
using the same algorithm.
The Information Technology (Certifying Authorities) Rules, 2000
II. ‘A’ will encrypt the hash value with its Private Key. Encrypted hash value is
known as Digital Signature.
III. ‘A’ will append Digital Signature with the electronic document and send it to the
recipient ‘B’.
11
Section 35of the Information Technology Act,2000- Certifying authority to issue Electronic
signature certificate
person if satisfies all conditions can apply for the Electronic Signature Certificate.
Certifying Authorities reserve the right to suspend12, revoke13 the Electronic
Signature Certificate if they find any violation of the rules or, negligence
performed by the subscribers. In similar manner Controller of Certifying
Authority can take action against CAs in case of any contravention. If Subscribers
are facing any problem in relation to Electronic Signature Certificates, they can
report their problem to the concern CA. Complaint against CAs will be heard by
Controller of Certifying Authority after proper enquiry.
12
Section37of the Information Technology Act,2000- Suspension of Digital Signature Certificate
13
Section 38 of the Information Technology Act,2000- Revocation of Digital Signature Certificate
14
Vakul Sharma, “Information Technology-Law and Practice”,3rdEdn.,Universal Law Publishing Co.
Pvt. Ltd.,2011.
perform the same functions-signer’s authentication, message integrity and non-
repudiation. The Information Technology (Amendment) Act, 2008, in order to
maintain continuity with the regime of the digital signatures has introduced the
concept of ‘electronic signature’15. Example of electronic signature may include
biometric signatures, passwords, PIN, etc.16
17
http://www.advocatekhoj.com/library/bareacts/indianevidence/index.php?Title=Indian%20Evidence
%20Act,%201872 visited on 11/10/2014
18
Section- 47A of The Indian Evidence Act, 1872-Opinion as to digital signature when relevant-
When the Court has to form an opinion as to the digital signature of any person, the opinion of the
Certifying Authority which has issued the Digital Signature Certificate is a relevant fact.
19
Section- 67A of The Indian Evidence Act, 1872-Proof as to digital signature- Except in the case of a
secure digital signature, if the digital signature of any subscriber is alleged to have been affixed to an
electronic record the fact that such digital signature is the digital signature of the subscriber must be
proved.
20
The Information Technology Act, 2000
Section 73A- Proof as to verification of digital signature21 – This particular section
will only be applicable to the pending matters before the court. Court will
validate whether a Digital Signature belongs to that person to whom it is
attributed or not. In order to verify this, court may direct;
(1) That person (who is the subscriber of the certificate) to produce the Digital
Signature Certificate before the court, and court may also direct the Controller
of the Certifying Authorities and the Certifying Authorities to provide the
details about that subscriber’s Digital Signature Certificate because they are
authorized to maintain repositories of all issued, suspended, and revoked
Digital Signature Certificate.
(2) Any other person to apply the Public Key listed in the Digital Signature
Certificate and verify the Digital Signature purported to have been affixed by
that person.
Section 85A- Presumption as to electronic agreements22- It says that if any
electronic agreement is concluded by affixing Electronic Signature to it, then
court will presume that it’s an authentic Electronic Document.
Section 85B- Presumption as to electronic records and digital signatures23-
(1) It says that Court will assume unless contrary is proved, a Secure Electronic
Record means to be a Secure Electronic Record from that time when any
security procedure has been applied to it till the time of verification.
21
Section 73A of the Indian Evidence Act, 1872-Proof as to verification of Digital Signature - In order
to ascertain whether a digital signature is that of the person by whom it purports to have been affixed,
the Court may direct-
(a) that person or the Controller or the Certifying Authority to produce the digital signature Certificate;
(b) any other person to apply the public key listed in the Digital Signature Certificate and verify the
digital signature purported to have been affixed by that person.
22
Section- 85A of The Indian Evidence Act, 1872 - Presumption as to electronic agreements.- The
Court shall presume that every electronic record purporting to be an agreement containing the digital
signatures of the parties was so concluded by affixing the digital signature of the parties
23
Section-85B of The Indian Evidence Act, 1872 - Presumption as to electronic records and digital
signatures.-
(1) In any proceedings involving a secure electronic record, the Court shall presume unless contrary is
proved, that the secure electronic record has not been altered since the specific point of time to which
the secure status relates.
(2) In any proceedings, involving secure digital signature, the Court shall presume unless the contrary
is proved that— (a) the secure digital signature is affixed by subscriber with the intention of signing or
approving the electronic record;
(b) except in the case of a secure electronic record or a secure digital signature, nothing in this section
shall create any presumption, relating to authenticity and integrity of the electronic record or any digital
signature.
(2) It provides that unless the contrary is proved, the court shall presume that the
Secure Electronic Signature is attached by the subscriber with the intent of
signing or approving the Electronic Record. It also says that there shall be no
presumption related to authenticity and integrity of the Electronic Record or
Electronic Signature if the same is not secure.
Section 85C- Presumption as to Digital Signature Certificate24 - This particular
section says that court shall presume unless contrary is proved, that information
recorded in Digital Signature Certificate is correct and true as well. Reason for
this that why court is relying on the given information is that; subscriber while
making application for the Digital Signature Certificate, certifies that all the
information is given for this process is true.
Section 90-Presumption as to electronic records five years old25-It talks about two
main conditions that;
(1) If Electronic Record is proved to be five year old;
(2) If it is proved to be in proper custody;
Then, court may assume that the validity of agreement is authenticated by Digital
Signature which is fixed with it. Person who is authorized to use Digital
Signature can also fix the Digital Signature. Custody of the Electronic Record
should remain with the authorized person.
10. Conclusion:
Till date use of Digital Signature or Electronic Signature is limited to Electronic
documents, formation of contract by way of electronic medium and electronic
transactions. They are not applicable to the paper based documents yet.
However, electronic signatures in combination with other security features
(Which may be incorporated in the paper based documents.) may be used to sign
a paper-based document also.
24
Section 85Cof the Indian Evidence Act, 1872 - Presumption as to Digital Signature Certificate - The
Court shall presume, unless contrary is proved, that the information listed in a Digital Signature
Certificate is correct, except for information specified as subscriber information which has not been
verified, if the certificate was accepted by the subscriber.
25
Section 90A of the Indian Evidence Act, 1872- Presumption as to electronic records five years old-
Where any electronic record, purporting or proved to be five years old, is produced from any custody
which the Court in the particular case considers proper, the Court may presume that the digital
signature which purports to be the digital signature of any particular person was so affixed by him or
any person authorised by him in this behalf.