Digital Signatures
Digital Signatures
Digital Signatures
Electronic Record
Very easy to make copies Very fast distribution Easy archiving and retrieval Copies are as good as original Easily modifiable Environmental Friendly
Digital Signatures
Each individual generates his own key pair
Public key known to everyone & Private key only to the owner
SIGNED MESSAGE
Calculated Hash
Message
Message + signature
Hash
Signatures verified
OK
if
Hash
Sender
Receiver
Electronic
Can not be copied
V/s
Signature depends on the contents of the document Any computer user Error free
Smart Cards
The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesnt leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system. (Having smart card reader)
Hardware Tokens
They are similar to smart cards in functionality as
Key is generated inside the token. Key is highly secured as it doesnt leave the token. Highly portable. Machine Independent.
iKEY is one of the most commonly used token as it doesnt need a special reader and can be connected to the system using USB port.
Certifying Authority
Must be widely known and trusted
Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates revoked Displays online the license issued by the Controller Displays online approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and Guidelines
Public-Key Certification
User Certificate Serial No. User Name & other credentials Certificate Database
User Name
Signed by using CAs private key Users Email Address Users Public Key CAs Name Certificate Class Validity Digital Signature of CA Publis h
Certificate Request
Users Public key
Public
Public
Private
Web site of CA
Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key
Trust Path
Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs) Controller certifies the association of CA with his public key Certifying Authority (CA) is the trusted authority responsible for creating or certifying identities. CA certifies the association of an individual with his public key
Role of controller
Controller of Certifying Authorities as the Root Authority certifies the technologies,infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
Summary
Each individual has a pair of keys Public key of each individual is certified by a CA (Certifying Authority) Public keys of CAs are certified by the Controller Public key of the Controller is self certified Public keys of everyone are known to all concerned and are also available on the web Certification Practice Statement is displayed on the web site
Applications in Judiciary
1. Instant posting of judgment on the web. 2. Secured electronic communications within judiciary 3. Authentic archiving of Judicial records 4. Submission of affidavits 5. Giving certified copies of the Judgment
Applications in Telecommunications
A. Subscribers
Subscribers services management
STD/ISD, Opening, Closing, Initializing Password
Shifting of telephones, Accessories (Clip, Cordless) Small Payments through telephones bills
Books, gifts, Internet purchases Share market trading, Intra/Inter office instructions
Applications in Telecommunications
(contd.)
B. Internal Intra/Inter offices authentic communications OBs, approvals, Instructions, requests Procurement of material Calling/Receiving bids, Purchase orders, Payment instructions Network Management functions Change of configuration, Blocking/unblocking routes
Encryption Technologies
Confidentiality
Encrypted Document Encrypted Document Document
Document
Public Key of B
Private Key of B
E-Governance
Empowering Citizens
a) b) c) d) Transparency Accountability Elimination of Intermediatory Encouraging Citizens to exercise their Rights
Government Online
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Issuing forms and licences Filing tax returns online Online Government orders/treasury orders Registration Online file movement system Public information records E-voting Railway reservations & ticketing E-education Online money orders
Thank You