Digital Signatures

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 26

Digital Signatures

Electronic Record
Very easy to make copies Very fast distribution Easy archiving and retrieval Copies are as good as original Easily modifiable Environmental Friendly

Why Digital Signatures


To provide Authenticity, Integrity and Nonrepudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and eGovernance

What is Digital Signature


Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document
Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature

Digital Signatures
Each individual generates his own key pair
Public key known to everyone & Private key only to the owner

Private Key Used for making digital signature

Public Key Used to verify the digital signature

SIGNED MESSAGE
Calculated Hash

Message

Message + signature

Sent thru Internet

Message + Signature COMPARE

Hash

Signatures verified

OK

if

SIGN hash With Senders Private key

Hash

Sender

Receiver

Decrypt Signature With Senders Public Key

Paper signatures v/s Digital Signatures


Parameter Paper
May be forged

Electronic
Can not be copied

Authenticity Integrity Nonrepudiation

V/s

Signature independent of the document a. b.

Signature depends on the contents of the document Any computer user Error free

Handwriting a. expert needed Error prone b.

Private key protection


The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. The key is secured using
PIN Protected soft token Smart Cards Hardware Tokens

PIN protected soft tokens


The Private key is encrypted and kept on the Hard Disk in a file, this file is password protected. This forms the lowest level of security in protecting the key, as
The key is highly reachable. PIN can be easily known or cracked.

Soft tokens are also not preferred because


The key becomes static and machine dependent. The key is in known file format.

Smart Cards
The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesnt leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system. (Having smart card reader)

Hardware Tokens
They are similar to smart cards in functionality as
Key is generated inside the token. Key is highly secured as it doesnt leave the token. Highly portable. Machine Independent.

iKEY is one of the most commonly used token as it doesnt need a special reader and can be connected to the system using USB port.

Public Key Infrastructure (PKI)


Some Trusted Agency is required which certifies the association of an individual with the key pair. This association is done by issuing a certificate to the user by the CA

Certifying Authority (CA)

All public key certificates are digitally signed by the CA

Public key certificate (PKC)

Certifying Authority
Must be widely known and trusted

Must have well defined Identification process before issuing the certificate Provides online access to all the certificates issued Provides online access to the list of certificates revoked Displays online the license issued by the Controller Displays online approved Certification Practice Statement (CPS) Must adhere to IT Act/Rules/Regulations and Guidelines

Public-Key Certification
User Certificate Serial No. User Name & other credentials Certificate Database

User Name
Signed by using CAs private key Users Email Address Users Public Key CAs Name Certificate Class Validity Digital Signature of CA Publis h

Certificate Request
Users Public key

License issued by CCA

User 1 certificate User 2 certificate .

Public

Public

Private

Web site of CA

Key pair Generation

Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key

More than one person are required for signing


HSM is housed in a strong room with video surveillance on 24x7 basis.

Trust Path
Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs) Controller certifies the association of CA with his public key Certifying Authority (CA) is the trusted authority responsible for creating or certifying identities. CA certifies the association of an individual with his public key

Role of controller
Controller of Certifying Authorities as the Root Authority certifies the technologies,infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates

Summary
Each individual has a pair of keys Public key of each individual is certified by a CA (Certifying Authority) Public keys of CAs are certified by the Controller Public key of the Controller is self certified Public keys of everyone are known to all concerned and are also available on the web Certification Practice Statement is displayed on the web site

Applications in Judiciary
1. Instant posting of judgment on the web. 2. Secured electronic communications within judiciary 3. Authentic archiving of Judicial records 4. Submission of affidavits 5. Giving certified copies of the Judgment

Applications in Telecommunications
A. Subscribers
Subscribers services management
STD/ISD, Opening, Closing, Initializing Password

Shifting of telephones, Accessories (Clip, Cordless) Small Payments through telephones bills
Books, gifts, Internet purchases Share market trading, Intra/Inter office instructions

Mobile Authentication of SMS Mobile Phones as Credit cards


Mobile operator can venture into credit card business

Applications in Telecommunications

(contd.)

B. Internal Intra/Inter offices authentic communications OBs, approvals, Instructions, requests Procurement of material Calling/Receiving bids, Purchase orders, Payment instructions Network Management functions Change of configuration, Blocking/unblocking routes

Public Key Cryptography

Encryption Technologies
Confidentiality
Encrypted Document Encrypted Document Document

Document

Public Key of B

Private Key of B

E-Governance
Empowering Citizens
a) b) c) d) Transparency Accountability Elimination of Intermediatory Encouraging Citizens to exercise their Rights

Government Online
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Issuing forms and licences Filing tax returns online Online Government orders/treasury orders Registration Online file movement system Public information records E-voting Railway reservations & ticketing E-education Online money orders

Thank You

You might also like