SlideShare a Scribd company logo
1 of 1
Download to read offline
Digital Signature Usage
Can I use one digital certificate for multiple e-mail addresses?
No, you cannot. A digital certificate e-mail address combination is unique.
What is the scope of using digital signatures for e-tendering systems?
Digital signatures for e-tendering are allowed, though with limited scope.The following transactions/instruments are not recognized as per the IT Act
2000:

•
•
•
•
•
•

Negotiable Instrument as defined in section 13 of 26 of 1881.The Negotiable Instrument Act,1881.
A Power-of-Attorney.
Succession Act/Will.
Trust
Transfer of Immovable property
Trust

Can digital signatures be used in wireless networks?
Yes, digital signatures can be employed in wireless networks

Digital Signature Usage EMAIL SECTION:
What is the difference between signing and encrypting an e-mail?
Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with
en-route to their inbox. Signing authenticates a message, but it does not provide protection against third party monitoring.Encrypting a message means
scrambling it in such a way that only the designated recipients can unscramble it. This safeguards messages against monitoring or interception. In
order to send a signed message, you must have a Digital Certificate. Since message encryption is done using specific keys available in the certificate,
you cannot encrypt a message unless you possess the recipient's Digital Certificate.
Can I send a secure e-mail to someone who does not have Digital Certificate?
You can digitally sign any e-mail as long as the recipient has an e-mail application, which supports S/MIME. However, you cannot encrypt a message,
unless you have the recipient's Digital Certificate.
How do I know if the e-mail I have received is digitally signed or encrypted?
Microsoft Internet Explorer Users: Signed messages will be shown in the inbox (or any other folder) with a red ribbon on the envelope icon. Encrypted
messages will show a padlock on the envelope icon.
Netscape Communicator Users: Any signed e-mail you receive will have a prominent icon in the upper-right corner of the message saying "signed" or
"encrypted" or both. If you want more information about the security of a message, click on the Security button (padlock icon) above the message.
Where can I use digital certificates?
You can use Digital Certificates for the following:

•
•
•
•
How

For secure email and web-based transactions, or to identify other participants of web-based transactions.
To prove ownership of a domain name and establish SSL / TLS encrypted secured sessions between your website and the user for web based transactions.
As a developer, for proving authorship of a code and retaining integrity of the distributed software programs.
For signing web forms, e-tendering documents, filing income tax returns, to access membership-based websites automatically without entering a user
name and password etc.
does

a

Digital

Signature

work?

A digital certificate explicitly associates the identity of an individual/device with a pair of electronic keys - public and private keys - and this association is endorsed
by the CA. The certificate contains information about a user's identity (for example, their name, email address, the date the certificate was issued and the name of the
Certifying Authority that issued it

More Related Content

What's hot

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Digital Signature
Digital Signature Digital Signature
Digital Signature Vakilsearch
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theftguest3151b0
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signatureNetri Chowdhary
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605SovanChanda
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)azmatmengal
 

What's hot (19)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Digital Signature
Digital Signature Digital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)
 

Similar to Digital Certificate Email usage

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun tejashree bangera
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 

Similar to Digital Certificate Email usage (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
It act
It actIt act
It act
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 

Digital Certificate Email usage

  • 1. Digital Signature Usage Can I use one digital certificate for multiple e-mail addresses? No, you cannot. A digital certificate e-mail address combination is unique. What is the scope of using digital signatures for e-tendering systems? Digital signatures for e-tendering are allowed, though with limited scope.The following transactions/instruments are not recognized as per the IT Act 2000: • • • • • • Negotiable Instrument as defined in section 13 of 26 of 1881.The Negotiable Instrument Act,1881. A Power-of-Attorney. Succession Act/Will. Trust Transfer of Immovable property Trust Can digital signatures be used in wireless networks? Yes, digital signatures can be employed in wireless networks Digital Signature Usage EMAIL SECTION: What is the difference between signing and encrypting an e-mail? Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with en-route to their inbox. Signing authenticates a message, but it does not provide protection against third party monitoring.Encrypting a message means scrambling it in such a way that only the designated recipients can unscramble it. This safeguards messages against monitoring or interception. In order to send a signed message, you must have a Digital Certificate. Since message encryption is done using specific keys available in the certificate, you cannot encrypt a message unless you possess the recipient's Digital Certificate. Can I send a secure e-mail to someone who does not have Digital Certificate? You can digitally sign any e-mail as long as the recipient has an e-mail application, which supports S/MIME. However, you cannot encrypt a message, unless you have the recipient's Digital Certificate. How do I know if the e-mail I have received is digitally signed or encrypted? Microsoft Internet Explorer Users: Signed messages will be shown in the inbox (or any other folder) with a red ribbon on the envelope icon. Encrypted messages will show a padlock on the envelope icon. Netscape Communicator Users: Any signed e-mail you receive will have a prominent icon in the upper-right corner of the message saying "signed" or "encrypted" or both. If you want more information about the security of a message, click on the Security button (padlock icon) above the message. Where can I use digital certificates? You can use Digital Certificates for the following: • • • • How For secure email and web-based transactions, or to identify other participants of web-based transactions. To prove ownership of a domain name and establish SSL / TLS encrypted secured sessions between your website and the user for web based transactions. As a developer, for proving authorship of a code and retaining integrity of the distributed software programs. For signing web forms, e-tendering documents, filing income tax returns, to access membership-based websites automatically without entering a user name and password etc. does a Digital Signature work? A digital certificate explicitly associates the identity of an individual/device with a pair of electronic keys - public and private keys - and this association is endorsed by the CA. The certificate contains information about a user's identity (for example, their name, email address, the date the certificate was issued and the name of the Certifying Authority that issued it