Digital signature 3

750 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
750
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
28
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital signature 3

  1. 1. PRESENTED BY: ANKITA DAVE 1
  2. 2. SR.NO. TOPIC SLIDE NO. 1. WHAT IS DIGITAL SIGNATURES? 4 2. WHY DIGITAL SIGNATURES? 5 3. PAPER SIGNATURES VS DIGITAL SIGNATURES 6 4. PRIVATE KEY & PUBLIC KEY 7 5. PROTECTION OF PRIVATE KEY 8 6. WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)? 9 7. CERTIFICATION AUTHORITY (CA) 10 8. HOW DOES DIGITAL SIGNATURES WORKS? 11 9. PROCEDURE TO OBTAIN DSC 12 2
  3. 3. SR.NO. TOPIC SLIDE NO. 10. STEP 1: DOWNLOADING ROOT CERTIFICATE 13 11. STEP 2: SELECTING A CERTIFYING AUTHORITY 18 12. STEP 3: VISIT THE WEBSITE OF THE CA 19 13. CLASS- 1 CERTIFICATES 20 14. CLASS- 2 CERTIFICATES 21 15. CLASS- 3 CERTIFICATES 22 16. STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED 23 17. STEP 5: SUBMIT AN ONLINE REQUEST 24 18. CONCLUSION 29 19. SOURCES OF INFORMATION 30 3
  4. 4.  As per Information Technology Act 2000, digital signature means authentication of any electronic record by means of an electronic. Simply, signature in digital form OR Mark to authenticate a document. 4
  5. 5.  Authentification. Integrity. Low cost. Eliminates the use of paper. Faster procedures. Completely secure. 5
  6. 6. PARAMETER PAPER DIGITALAuthenticity May be forged Can not be copiedIntegrity Signature Signature depends independent of on the contents of the document the documentNon-repudiation a. Handwriting a. Any computer expert needed user b. Error prone b. Error free 6
  7. 7. Each individual generates his own key pair. PRIVATE KEY PUBLIC KEY Known only to Known to owner everyone Used for making Used to verify digital signature digital signature 7
  8. 8. The private key generated is to be protected & kept in secret because  Can be misused by anyone who is having access to your computer system.  Is lost if computer system is formatted or internet explorer is changed. The key is secured using 8
  9. 9. Is an electronic means of establishing records when doing transactions on the Internet.Are easily transportable and cannot be imitated.Contains details like owner’s name & public key, expiration date of public, serial number & name of the issuer (the Certification Authority) & his digital signature.It is issued so that Recipient can verify that the certificate is authentic. 9
  10. 10. SR. NO. NAMES OF CA WEBSITES 1. NIC nicca.nic.in 2. GNFC www.ncodesolutions.com 3. SAFESCRYPT www.safescrypt.com 4. TCS www.tcs-ca.tcs.co.in 5. MTNL TRUSTLINE www.mtnltrustline.com 6. IDRBT www.idrbtca.org.in 7. E-MUDHRA www.e-Mudhra.com 10
  11. 11. 11
  12. 12. DOWNLOADING ROOT CERTIFICATE SELECTING A CERTIFYING AUTHORITYVISIT THE WEBSITE OF CERTIFYING AUTHORITY SELECT THE TYPE OF CERTIFICATE NEEDED SUBMIT AN ONLINE REQUEST 12
  13. 13. Visit the website of the Controller of Certifying Authorities (CCA) at www.cca.gov.in. 13
  14. 14. 14
  15. 15. 15
  16. 16. 16
  17. 17. 17
  18. 18.  Visit the website of the CCA at www.cca.gov.in to obtain a list of licensed Certifying Authorities in India. Based on information and study of the relevant websites, select a Certifying Authority. Example: TCS official website is www.tcs-ca.tcs.co.in. 18
  19. 19. A visit to the select CA website provides following three types of digital signature certificates:CLASSES OF DSC: Class-1 certificates Class-2 certificates Class-3 certificates. 19
  20. 20.  These Certificates are personal e-mail Certificates that allows you to secure your email messages. These certificates can be used to: 1. Digitally sign email. 2. Encrypt email. 3. Authenticate to Web Servers. These certificates, however, do not facilitate strong authentication of the identity of the subscriber and hence, cannot be relied upon where proof of identity is required (commercial use). 20
  21. 21.  These Certificates are issued as Managed Digital Certificates to employees/ partners/ affiliates/ customers of business and government organizations that are ready to assume the responsibility of verifying the accuracy of the information submitted by their employees/ partners/ affiliates/ customers. These certificates issued under the TCS-CA Trust Network are legally valid under the Indian IT Act 2000. 21
  22. 22.  These Certificates are issued to individuals, companies and government organizations. They can be used both for personal and commercial purposes. They are typically used for electronic commerce applications where security is a major concern. These Certificates issued by the TCS-CA are legally valid under Indian IT Act 2000. 22
  23. 23. We need a legally valid digital signaturecertificate for an individual. The relevantcertificate is a class-3 certificate. 23
  24. 24. The next step is to create a user account on theTCS CA website, complete an online enrollmentform and generate a cryptographic key pair onour computer. 24
  25. 25. 25
  26. 26. 26
  27. 27. 27
  28. 28. 28
  29. 29. Hence, we can conclude that digital signatures:Minimizes the risk of dealing with imposters.Minimizes the risk of undetected message tampering and forgery.Retains a high degree of information security. 29
  30. 30. asclonline.com/images/d/d4/Simple_Guide_to_ Digital_Signatures.pdfwww.youdzone.com/signature.htmlen.wikipedia.org/wiki/Digital_signatureswww.cca.gov.inesolutions.net.in/digitalsignatures.htmlnsdl.co.in/business/cirRec_18Mar08.doc 30

×