SlideShare a Scribd company logo
1 of 15
Govt. Institute of
Forensic Science, Nagpur
Applied Digital & Cyber Forensics
B.Sc. IIIrd year
Sem.-Vth
Academic Session:- 2018-19
Creation & Verification of Digital Signature
using Digisigner
Presented by,
Rituja R. Gharote
Mamta A. Barmase
Palash A. Mehar
Digital Signature
It is a type of electronic signature that encrypts
documents with digital codes that are particularly
difficult to duplicate.
A digital signature is an authentication
mechanism that enables the creator of message to
attach a code that acts as a signature. The
signature is formed by taking the hash of the
message and encrypting the message with the
creator’s private key .
Digital signature cryptographically bind an
electronic identity to an electronic document and
the signature can not be copied to another
document.
Working of Digital Signatgure
Digital signatures, like handwritten signatures are unique to
each signer. Digital signature solution providers such as Docusign,
follow a specific protocol, called PKI.
The digital signature can be considered as a numerical value
that is represented as a sequence of characters. The creation of a
digital signature is a complex mathematical process that can only be
created by a computer.
Working of Digital Signatgure
Consider a scenario where Alice has to digitally sign a file or an email and send it to bob.
Alice selects the file to be digitally signed or click on the ‘sign in’ her email application.
The hash value of the file content or the message is calculated by Alice’s computer.
This hash value encrypted with Alice signing key (which is private key) to create the digital
signature.
Now the original file or email message along with its digital signature are sent to Bob.
After Bob receives the sign message associated applications ( Email applications) identifies that
the message has been signed, Bob’s computer then proceed to,
Decrypt the digital signature using Alice’s public key
Calculate the hash of original message
Compare the (a) hash it has computed from the received message with the (b) decrypted
hash received with Alice’s message.
Working of Digital Signatgure
Attributes of Digital Signature
Digital signature ensures the confidentiality via. The
following three attributes,
1. Authentication
2. Integrity
3. Non-repudiation
Attributes of Digital Signature
1) Authentication:- Authentication means the act of proving who you say you are.
Authentication means that you know who created and sent the message. Digital
signature is used to authenticate the source of message. It ensures the user of sender.
2) Integrity:- Integrity ensures that when a message is sent over a network, the data
that arrives is the same as the data that was originally sent. Integrity is the assurance
that the information is trustworthy and accurate. Digital signature ensures the
integrity of the message.
3) Non-repudiation:- This is an important criteria of digital signature. As digital
signature ensures the authentication of the message, so the sender can’t repudiate it
later. At the same time it also ensures the identity of the receiver can’t repudiate it
later.
Controller of Certifying Authority(CCA)
The IT Act provides for the Controller of
Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities
and also to ensure that none of the provisions of
the Act are violated. The Certifying Authorities
(CAs) issue Digital Signature Certificates(DSC)
for electronic authentication of users.
The Controller of Certifying Authorities (CCA)
has been appointed by the Central Government
under section 17 of the Act for purposes of the
IT Act. The Office of the CCA came into
existence on November 1, 2000. It aims at
promoting the growth of E-Commerce and E-
Governance through the wide use of digital
signatures.
Sections related to digital signature
Section 47A in The Indian Evidence Act, 1872
47A Opinion as to electronic signature when relevant
When the Court has to form an opinion as to the electronic signature of
any person, the opinion of the Certifying Authority which has issued the Electronic
Signature Certificate is a relevant fact.
Section 73A in The Indian Evidence Act, 1872
Proof as to verification of digital signature.
In order to ascertain whether a digital signature is that of the person by
whom it purports to have been affixed, the Court may direct73A.
Digisigner 4.0
Size :- 8.41 MB
License:- Freeware
Publisher:- Listed programs
Released Date:- 2013/10/21
Operating system:- Windows 2000/XP/Vista/7/8/10
• Features:-
 Audit trail
 Authentication
 Auto reminders
 Customized templates
 Document Analytics
 E-signature
 Mobile signature
 Multi-party signing
 Task progress tracking
Steps of creation of digital signature using
Digisigner
Open a pdf with a Digisigner.
Once the pdf is open, select on signature menu.
Drag the mouse wherever you want to place your sign, Right click on mouse
Either you can use default signature or you can generate your own signature by using the
option generate your own certificate.
Fill your necessary information like name, email, organization’s unit, organization, two-
letter country code etc.
The destination of scoring the key obtained from digital signature should be document
file only.
Give suitable password and click on generate
Once you have generated your own signaturem, you can sign any pdf file click on sign.
Save it with desired name on desired destination.
Steps of Validation of Digital signature using
Digisigner
 Open the pdf you want to validate
with Digisigner
 Either right click on the signature you
want to validate or select validate
signature menu on the extreme right
corner
 This will show whether the signature
is valid or not
Mamta Barmase
Date: 25/07/18
]
Mamta Barmase
Date: 25/07/18
Creation & Verification of Digital Signature using Digisigner

More Related Content

What's hot

Document Examination
Document ExaminationDocument Examination
Document Examinationannperry09
 
Forensic dactyloscopy
Forensic dactyloscopyForensic dactyloscopy
Forensic dactyloscopydentpress
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Collection, Preservation, Packaging and Forwarding of Forged Documents
Collection, Preservation, Packaging and Forwarding of Forged DocumentsCollection, Preservation, Packaging and Forwarding of Forged Documents
Collection, Preservation, Packaging and Forwarding of Forged Documentspinkihablani
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000ShashankBajpai24
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptxSHAILESH CHAUBEY
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionskiran malik
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signatureShivangiRathore8
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 

What's hot (20)

Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Document Examination
Document ExaminationDocument Examination
Document Examination
 
Counterfeiting Currency Notes
Counterfeiting Currency Notes Counterfeiting Currency Notes
Counterfeiting Currency Notes
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Forensic dactyloscopy
Forensic dactyloscopyForensic dactyloscopy
Forensic dactyloscopy
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Collection, Preservation, Packaging and Forwarding of Forged Documents
Collection, Preservation, Packaging and Forwarding of Forged DocumentsCollection, Preservation, Packaging and Forwarding of Forged Documents
Collection, Preservation, Packaging and Forwarding of Forged Documents
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
 
Forensic Examination of Signature
Forensic Examination of SignatureForensic Examination of Signature
Forensic Examination of Signature
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signature
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 

Similar to Creation & Verification of Digital Signature using Digisigner

Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in KolkataDigitalSignatureOnli
 

Similar to Creation & Verification of Digital Signature using Digisigner (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Ds over
Ds overDs over
Ds over
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
 
Digital signature
Digital signatureDigital signature
Digital signature
 

More from Palash Mehar

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Palash Mehar
 
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Palash Mehar
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA TechnologyPalash Mehar
 
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPoisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPalash Mehar
 
Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Palash Mehar
 
Nanotechnology powder
Nanotechnology powderNanotechnology powder
Nanotechnology powderPalash Mehar
 
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Palash Mehar
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral ComparatorPalash Mehar
 
Polymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPolymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPalash Mehar
 
Biomechanics of Injury
Biomechanics of InjuryBiomechanics of Injury
Biomechanics of InjuryPalash Mehar
 
Forensic Biology Case Study :- The Colin Pitchfork Case
Forensic Biology Case Study :-  The Colin Pitchfork CaseForensic Biology Case Study :-  The Colin Pitchfork Case
Forensic Biology Case Study :- The Colin Pitchfork CasePalash Mehar
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Palash Mehar
 
Forensic chemistry case study
Forensic chemistry case studyForensic chemistry case study
Forensic chemistry case studyPalash Mehar
 
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Palash Mehar
 
Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Palash Mehar
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Palash Mehar
 
Intelligence tests 01
Intelligence tests 01Intelligence tests 01
Intelligence tests 01Palash Mehar
 
Stellar phoenix password recovery
Stellar phoenix password recoveryStellar phoenix password recovery
Stellar phoenix password recoveryPalash Mehar
 

More from Palash Mehar (20)

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)
 
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA Technology
 
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPoisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
 
Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)
 
Nanotechnology powder
Nanotechnology powderNanotechnology powder
Nanotechnology powder
 
Ninhydrin Analogs
Ninhydrin AnalogsNinhydrin Analogs
Ninhydrin Analogs
 
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 
Polymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPolymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf Instrument
 
Biomechanics of Injury
Biomechanics of InjuryBiomechanics of Injury
Biomechanics of Injury
 
Forensic Biology Case Study :- The Colin Pitchfork Case
Forensic Biology Case Study :-  The Colin Pitchfork CaseForensic Biology Case Study :-  The Colin Pitchfork Case
Forensic Biology Case Study :- The Colin Pitchfork Case
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Forensic chemistry case study
Forensic chemistry case studyForensic chemistry case study
Forensic chemistry case study
 
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
 
Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Rehabilitation : Principle and its types
Rehabilitation : Principle and its types
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
Email recovery
Email recoveryEmail recovery
Email recovery
 
Intelligence tests 01
Intelligence tests 01Intelligence tests 01
Intelligence tests 01
 
Stellar phoenix password recovery
Stellar phoenix password recoveryStellar phoenix password recovery
Stellar phoenix password recovery
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Creation & Verification of Digital Signature using Digisigner

  • 1. Govt. Institute of Forensic Science, Nagpur Applied Digital & Cyber Forensics B.Sc. IIIrd year Sem.-Vth Academic Session:- 2018-19
  • 2. Creation & Verification of Digital Signature using Digisigner Presented by, Rituja R. Gharote Mamta A. Barmase Palash A. Mehar
  • 3. Digital Signature It is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. A digital signature is an authentication mechanism that enables the creator of message to attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator’s private key . Digital signature cryptographically bind an electronic identity to an electronic document and the signature can not be copied to another document.
  • 4. Working of Digital Signatgure Digital signatures, like handwritten signatures are unique to each signer. Digital signature solution providers such as Docusign, follow a specific protocol, called PKI. The digital signature can be considered as a numerical value that is represented as a sequence of characters. The creation of a digital signature is a complex mathematical process that can only be created by a computer.
  • 5. Working of Digital Signatgure Consider a scenario where Alice has to digitally sign a file or an email and send it to bob. Alice selects the file to be digitally signed or click on the ‘sign in’ her email application. The hash value of the file content or the message is calculated by Alice’s computer. This hash value encrypted with Alice signing key (which is private key) to create the digital signature. Now the original file or email message along with its digital signature are sent to Bob. After Bob receives the sign message associated applications ( Email applications) identifies that the message has been signed, Bob’s computer then proceed to, Decrypt the digital signature using Alice’s public key Calculate the hash of original message Compare the (a) hash it has computed from the received message with the (b) decrypted hash received with Alice’s message.
  • 6. Working of Digital Signatgure
  • 7. Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1. Authentication 2. Integrity 3. Non-repudiation
  • 8. Attributes of Digital Signature 1) Authentication:- Authentication means the act of proving who you say you are. Authentication means that you know who created and sent the message. Digital signature is used to authenticate the source of message. It ensures the user of sender. 2) Integrity:- Integrity ensures that when a message is sent over a network, the data that arrives is the same as the data that was originally sent. Integrity is the assurance that the information is trustworthy and accurate. Digital signature ensures the integrity of the message. 3) Non-repudiation:- This is an important criteria of digital signature. As digital signature ensures the authentication of the message, so the sender can’t repudiate it later. At the same time it also ensures the identity of the receiver can’t repudiate it later.
  • 9. Controller of Certifying Authority(CCA) The IT Act provides for the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities and also to ensure that none of the provisions of the Act are violated. The Certifying Authorities (CAs) issue Digital Signature Certificates(DSC) for electronic authentication of users. The Controller of Certifying Authorities (CCA) has been appointed by the Central Government under section 17 of the Act for purposes of the IT Act. The Office of the CCA came into existence on November 1, 2000. It aims at promoting the growth of E-Commerce and E- Governance through the wide use of digital signatures.
  • 10. Sections related to digital signature Section 47A in The Indian Evidence Act, 1872 47A Opinion as to electronic signature when relevant When the Court has to form an opinion as to the electronic signature of any person, the opinion of the Certifying Authority which has issued the Electronic Signature Certificate is a relevant fact. Section 73A in The Indian Evidence Act, 1872 Proof as to verification of digital signature. In order to ascertain whether a digital signature is that of the person by whom it purports to have been affixed, the Court may direct73A.
  • 11. Digisigner 4.0 Size :- 8.41 MB License:- Freeware Publisher:- Listed programs Released Date:- 2013/10/21 Operating system:- Windows 2000/XP/Vista/7/8/10
  • 12. • Features:-  Audit trail  Authentication  Auto reminders  Customized templates  Document Analytics  E-signature  Mobile signature  Multi-party signing  Task progress tracking
  • 13. Steps of creation of digital signature using Digisigner Open a pdf with a Digisigner. Once the pdf is open, select on signature menu. Drag the mouse wherever you want to place your sign, Right click on mouse Either you can use default signature or you can generate your own signature by using the option generate your own certificate. Fill your necessary information like name, email, organization’s unit, organization, two- letter country code etc. The destination of scoring the key obtained from digital signature should be document file only. Give suitable password and click on generate Once you have generated your own signaturem, you can sign any pdf file click on sign. Save it with desired name on desired destination.
  • 14. Steps of Validation of Digital signature using Digisigner  Open the pdf you want to validate with Digisigner  Either right click on the signature you want to validate or select validate signature menu on the extreme right corner  This will show whether the signature is valid or not Mamta Barmase Date: 25/07/18 ] Mamta Barmase Date: 25/07/18