• Like
Digital Certificate Email usage
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Digital Certificate Email usage

  • 27 views
Published

Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with en-route to their inbox

Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with en-route to their inbox

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
27
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Digital Signature Usage Can I use one digital certificate for multiple e-mail addresses? No, you cannot. A digital certificate e-mail address combination is unique. What is the scope of using digital signatures for e-tendering systems? Digital signatures for e-tendering are allowed, though with limited scope.The following transactions/instruments are not recognized as per the IT Act 2000: • • • • • • Negotiable Instrument as defined in section 13 of 26 of 1881.The Negotiable Instrument Act,1881. A Power-of-Attorney. Succession Act/Will. Trust Transfer of Immovable property Trust Can digital signatures be used in wireless networks? Yes, digital signatures can be employed in wireless networks Digital Signature Usage EMAIL SECTION: What is the difference between signing and encrypting an e-mail? Signing an e-mail message means that you attach your Digital Certificate to it so that the recipient knows it came from you and was not tampered with en-route to their inbox. Signing authenticates a message, but it does not provide protection against third party monitoring.Encrypting a message means scrambling it in such a way that only the designated recipients can unscramble it. This safeguards messages against monitoring or interception. In order to send a signed message, you must have a Digital Certificate. Since message encryption is done using specific keys available in the certificate, you cannot encrypt a message unless you possess the recipient's Digital Certificate. Can I send a secure e-mail to someone who does not have Digital Certificate? You can digitally sign any e-mail as long as the recipient has an e-mail application, which supports S/MIME. However, you cannot encrypt a message, unless you have the recipient's Digital Certificate. How do I know if the e-mail I have received is digitally signed or encrypted? Microsoft Internet Explorer Users: Signed messages will be shown in the inbox (or any other folder) with a red ribbon on the envelope icon. Encrypted messages will show a padlock on the envelope icon. Netscape Communicator Users: Any signed e-mail you receive will have a prominent icon in the upper-right corner of the message saying "signed" or "encrypted" or both. If you want more information about the security of a message, click on the Security button (padlock icon) above the message. Where can I use digital certificates? You can use Digital Certificates for the following: • • • • How For secure email and web-based transactions, or to identify other participants of web-based transactions. To prove ownership of a domain name and establish SSL / TLS encrypted secured sessions between your website and the user for web based transactions. As a developer, for proving authorship of a code and retaining integrity of the distributed software programs. For signing web forms, e-tendering documents, filing income tax returns, to access membership-based websites automatically without entering a user name and password etc. does a Digital Signature work? A digital certificate explicitly associates the identity of an individual/device with a pair of electronic keys - public and private keys - and this association is endorsed by the CA. The certificate contains information about a user's identity (for example, their name, email address, the date the certificate was issued and the name of the Certifying Authority that issued it