Digital signatures are the most advanced and secure type of electronic signature. You can use them to comply with the most demanding legal and regulatory requirements because they provide the highest levels of assurance about each signer's identity and the authenticity of the documents they sign.
Digital signatures use a certificate-based digital ID issued by an accredited Certificate Authority (CA) or Trust Service Provider (TSP) so when you digitally sign a document, your identity is uniquely linked to you, the signature is bound to the document with encryption, and everything can be verified using underlying technology known as Public Key Infrastructure (PKI).
https://signyourdoc.com/
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, and members of the European Union, electronic signatures have legal significance.
What is a Digital Signature? | How Digital Signature work?MSA Technosoft
This tutorial helps you to learn about Digital Signature. See how a digital signature work? Key Concepts: Encrytption & Decryption, Algortithms, RSA, Public Key & Private Key, Advantage of DSC, Disadvantage of DSC
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016Marshall Swatt
Have you heard of a new currency called bitcoin? Or a new technology called the blockchain? Almost $1BB has been invested into numerous startups over the past four years by prominant Venture Capital firms. Dozens of startups have been formed in Silicon Valley, New York, London, and as far away as Chile and India. And in the past year, large tech companies and banks have begun to work on new products and services that leverage this new currency and technology. Many companies across the financial services industry are concerned about bitcoin's potential to substantially disrupt their business. Yet very few people understand what bitcoin is or how it works. Even fewer are able to grasp its potential to disrupt existing financial services or transform various types of transactions, whether financial or non-financial.
This talk will provide you with a basic understanding of the economics and science behind bitcoin and the blockchain.
With Bitcoin you can:
- Send $1 or $1MM instantly and for free anywhere in the world, to a family member or a business
- Guarantee that funds are received even if you don't know or trust the recipient
- Vote in a government or corporate election, with instant tallies and fully auditable, immutable and transparent voting ledgers
Questions we will address include:
What is bitcoin? How is it created? How do you use it?
What is the blockchain? How does it work? Who can use it?
How does bitcoin compare with other currencies today? what advantages does it offer? What risks?
Is bitcoin secure and reliable? Is it stable as a currency?
What problems can bitcoin solve? What problems is it addressing right now?
Should you own bitcoin? Where will its price go over time?
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, and members of the European Union, electronic signatures have legal significance.
What is a Digital Signature? | How Digital Signature work?MSA Technosoft
This tutorial helps you to learn about Digital Signature. See how a digital signature work? Key Concepts: Encrytption & Decryption, Algortithms, RSA, Public Key & Private Key, Advantage of DSC, Disadvantage of DSC
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016Marshall Swatt
Have you heard of a new currency called bitcoin? Or a new technology called the blockchain? Almost $1BB has been invested into numerous startups over the past four years by prominant Venture Capital firms. Dozens of startups have been formed in Silicon Valley, New York, London, and as far away as Chile and India. And in the past year, large tech companies and banks have begun to work on new products and services that leverage this new currency and technology. Many companies across the financial services industry are concerned about bitcoin's potential to substantially disrupt their business. Yet very few people understand what bitcoin is or how it works. Even fewer are able to grasp its potential to disrupt existing financial services or transform various types of transactions, whether financial or non-financial.
This talk will provide you with a basic understanding of the economics and science behind bitcoin and the blockchain.
With Bitcoin you can:
- Send $1 or $1MM instantly and for free anywhere in the world, to a family member or a business
- Guarantee that funds are received even if you don't know or trust the recipient
- Vote in a government or corporate election, with instant tallies and fully auditable, immutable and transparent voting ledgers
Questions we will address include:
What is bitcoin? How is it created? How do you use it?
What is the blockchain? How does it work? Who can use it?
How does bitcoin compare with other currencies today? what advantages does it offer? What risks?
Is bitcoin secure and reliable? Is it stable as a currency?
What problems can bitcoin solve? What problems is it addressing right now?
Should you own bitcoin? Where will its price go over time?
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...Paperchain
Presented at the NYC Bar Association, an overview of the technologies that make up blockchain technology and why those technologies have implications with existing legal frameworks.
How do Things talk? IoT Application Protocols 101Christian Götz
Analysts predict that in 2020 50 billion devices are connected to the internet. Together with the fact that more and more of these "things" are connected over the cellular network, new challenges are introduced to the communication of Internet of Things (IoT) and machine-to-machine (M2M) scenarios. There are a lot of protocols which claim to be ideal for these use cases, for example MQTT and COAP. In this talk you will get an overview of commonly used protocols and their underlying architectural styles. We will also look at advantages/disadvantages, use cases and the eco-system around them for Java developers.
Summary
There has never been a time in the history of our species that has seen such innovation and rapid progress; and we have never been so confounded by the world we have realized! For sure, we have crossed the Rubicon from a linear past to a non-linear future and find ourselves lacking many of the basic tools we need to fully address the major problems confronting us.
In such an environment we have to prepared to be ‘unreasonable’, to challenge established wisdom, conventions and practices. So in this session, I present three challenging cases that do just that:
1) Wireless Spectrum: It is infinite and there is no bandwidth crisis!
2) Cyber Security: We need auto-immune systems aka biology
3) Information War: The biggest threat to the survival of our species
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...Christian Götz
Analysts predict that by 2020, 50 billion devices will be connected to the Internet. Together with the fact that more and more of these “things” are connected over cellular networks, new challenges are introduced to the communication of Internet of Things (IoT) and machine-to-machine (M2M) scenarios. There are a lot of protocols which claim to be ideal for these use cases, for example MQTT and CoAP. In this session you will get an overview of commonly used protocols and their underlying architectural styles. We will also look at advantages/disadvantages, use cases and the ecosystem around them.
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
This is a Blockchain introduction to different funding mechanisms in tokenisation. The presentation covers ICO - IEO - DAICO - STO - ETO and is presented by Ruben Merre.
Initial coin offerings - initial exchange offerings - security token offerings
201803 Daniel Dewar NYC Bar - Blockchain & Fintech ApplicationsPaperchain
Presentation deck delivered at NYC Bar as part of the Banking Regulatory panel. Covers technology components of blockchains and why these technologies have implications within ethics and legal frameworks.
Signyourd digital signature certificate providerKishankant Yadav
a digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.
This definition explains how digital signatures work and what they are used for. Learn about the mathematical underpinnings of digital signature technology
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
https://signyourdoc.com/
Check all process to unlock epass2003 usb token token online. New process to unlock Token Online.
If you have any issue you can contact
https://signyourdoc.com/
Class 2 Digital signature
https://signyourdoc.com/class-2-digital-signature/
Class 3 Digital signature
https://signyourdoc.com/class-3-digital-signature/
More Related Content
Similar to Digital signature online - What is digital signature
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
Concise version of presentation delivered at the NYC Bar Association.
Overview of blockchains, how cryptography works on blockchains and the difference between cryptocurrencies and tokens.
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...Paperchain
Presented at the NYC Bar Association, an overview of the technologies that make up blockchain technology and why those technologies have implications with existing legal frameworks.
How do Things talk? IoT Application Protocols 101Christian Götz
Analysts predict that in 2020 50 billion devices are connected to the internet. Together with the fact that more and more of these "things" are connected over the cellular network, new challenges are introduced to the communication of Internet of Things (IoT) and machine-to-machine (M2M) scenarios. There are a lot of protocols which claim to be ideal for these use cases, for example MQTT and COAP. In this talk you will get an overview of commonly used protocols and their underlying architectural styles. We will also look at advantages/disadvantages, use cases and the eco-system around them for Java developers.
Summary
There has never been a time in the history of our species that has seen such innovation and rapid progress; and we have never been so confounded by the world we have realized! For sure, we have crossed the Rubicon from a linear past to a non-linear future and find ourselves lacking many of the basic tools we need to fully address the major problems confronting us.
In such an environment we have to prepared to be ‘unreasonable’, to challenge established wisdom, conventions and practices. So in this session, I present three challenging cases that do just that:
1) Wireless Spectrum: It is infinite and there is no bandwidth crisis!
2) Cyber Security: We need auto-immune systems aka biology
3) Information War: The biggest threat to the survival of our species
How Do ‘Things’ Talk? - An Overview of the IoT/M2M Protocol Landscape at IoT ...Christian Götz
Analysts predict that by 2020, 50 billion devices will be connected to the Internet. Together with the fact that more and more of these “things” are connected over cellular networks, new challenges are introduced to the communication of Internet of Things (IoT) and machine-to-machine (M2M) scenarios. There are a lot of protocols which claim to be ideal for these use cases, for example MQTT and CoAP. In this session you will get an overview of commonly used protocols and their underlying architectural styles. We will also look at advantages/disadvantages, use cases and the ecosystem around them.
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
This is a Blockchain introduction to different funding mechanisms in tokenisation. The presentation covers ICO - IEO - DAICO - STO - ETO and is presented by Ruben Merre.
Initial coin offerings - initial exchange offerings - security token offerings
201803 Daniel Dewar NYC Bar - Blockchain & Fintech ApplicationsPaperchain
Presentation deck delivered at NYC Bar as part of the Banking Regulatory panel. Covers technology components of blockchains and why these technologies have implications within ethics and legal frameworks.
Signyourd digital signature certificate providerKishankant Yadav
a digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.
This definition explains how digital signatures work and what they are used for. Learn about the mathematical underpinnings of digital signature technology
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
https://signyourdoc.com/
Check all process to unlock epass2003 usb token token online. New process to unlock Token Online.
If you have any issue you can contact
https://signyourdoc.com/
Class 2 Digital signature
https://signyourdoc.com/class-2-digital-signature/
Class 3 Digital signature
https://signyourdoc.com/class-3-digital-signature/
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
2. Electronic Record
1. Very easy to make copies
2. Very fast distribution
3. Easy archiving and retrieval
4. Copies are as good as original
5. Easily modifiable
6. Environmental Friendly
Because of 4 & 5 together, these lack authenticity
3. Why Digital Signatures?
•To provide Authenticity,
Integrity and Non-
repudiation to electronic
documents
•To use the Internet as the
safe and secure medium for
e-Commerce and e-
Governance
4. Encryption
Caesar Cipher
The shift is linear and equidistributed 3changes
I agree lcdjuhh
Key Cipher
The shift is linear (cyclic) 269
k.n.gupta 62 mewam3rzjba
i+3=l
Space=c [+3]
k+2=m
(dot)=e [+6]
n=w [+9]
Char 1 2 3 4 5 6 7 8 9
a b c d e f g h i j
b c d e f g h i j k
c d e f g h i j k l
d e f g h i j k l m
e f g h i j k l m n
f g h i j k l m n o
g h i j k l m n o p
h i j k l m n o p q
i j k l m n o p q r
j k l m n o p q r s
k l m n o p q r s t
l m n o p q r s t u
m n o p q r s t u v
n o p q r s t u v w
o p q r s t u v w x
p q r s t u v w x y
q r s t u v w x y z
r s t u v w x y z 0
s t u v w x y z 0 1
t u v w x y z 0 1 2
u v w x y z 0 1 2 3
v w x y z 0 1 2 3 4
w x y z 0 1 2 3 4 5
x y z 0 1 2 3 4 5 6
y z 0 1 2 3 4 5 6 7
z 0 1 2 3 4 5 6 7 8
0 1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8 9 .
2 3 4 5 6 7 8 9 .
3 4 5 6 7 8 9 . a
4 5 6 7 8 9 . a b
5 6 7 8 9 . a b c
6 7 8 9 . a b c d
7 8 9 . a b c d e
8 9 . a b c d e f
9 . a b c d e f g
. (Dot) a b c d e f g h
Space a b c d e f g h i
5. ENCRYPTION
Message 2
The Internet knows no geographical boundaries.
It has redefined time and space. Advances in
computer and telecommunication technologies
have led to the explosive growth of the Internet.
This in turn is affecting the methods of
communication, work, study, education,
interaction, leisure, health, governance, trade
and commerce.
Encrypted Message 2
a520eecb61a770f947ca856cd675463f1c95a
9a2b8d4e6a71f80830c87f5715f5f59334978
dd7e97da0707b48a1138d77ced56feba2b46
7c398683c7dbeb86b854f120606a7ae1ed93
4f5703672adab0d7be66dccde1a763c736cb
9001d0731d541106f50bb7e54240c40ba780
b7a553bea570b99c9ab3df13d75f8ccfdddea
af3a749fd1411
Message 1
Central to the growth of e-commerce and e-
governance is the issue of trust in electronic
environment.
Encrypted Message 1
9a46894335be49f0b9cab28d755aaa9cd985
71b275bbb0adb405e6931e856ca3e5e569ed
d135285482
DECRYPTION
Encrypted Message 1
9a46894335be49f0b9cab28d755aaa9cd98571b
275bbb0adb405e6931e856ca3e5e569edd13528
5482
Message 1
Central to the growth of e-commerce and e-
governance is the issue of trust in electronic
environment.
Encrypted Message 2
a520eecb61a770f947ca856cd675463f1c95a9a2b
8d4e6a71f80830c87f5715f5f59334978dd7e97da
0707b48a1138d77ced56feba2b467c398683c7db
eb86b854f120606a7ae1ed934f5703672adab0d7
be66dccde1a763c736cb9001d0731d541106f50b
b7e54240c40ba780b7a553bea570b99c9ab3df13
d75f8ccfdddeaaf3a749fd1411
Message 2
The Internet knows no geographical boundaries. It has
redefined time and space. Advances in computer and
telecommunication technologies have led to the
explosive growth of the Internet. This in turn is
affecting the methods of communication, work, study,
education, interaction, leisure, health, governance,
trade and commerce.
Same Key
SYMMETRIC
Different Keys
[Keys of a pair – Public and Private]
ASYMMETRIC
[PKI]
6.
7. Digital Signatures
• Digital Signatures are numbers
• They are document content dependent
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents
8. Concepts
• A 1024 bits number is a very big number much bigger than
the total number of electrons in whole world.
• Trillions of Trillions of pairs of numbers exist in this range
with each pair having following property
– A message encrypted with one element of the pair can
be decrypted ONLY by the other element of the same pair
• Two numbers of a pair are called keys, the Public Key & the
Private Key. User himself generates his own key pair on his
computer
• Any message irrespective of its length can be compressed or
abridged uniquely into a smaller length message called the
Digest or the Hash.
• Smallest change in the message will change the Hash value
Click for Hash Generation
9. What is Digital Signature?
• Hash value of a message when
encrypted with the private key of a
person is his digital signature on that e-
Document
– Digital Signature of a person
therefore varies from document to
document thus ensuring authenticity
of each word of that document.
– As the public key of the signer is
known, anybody can verify the
message and the digital signature
10. Digital Signatures
Each individual generates his own key pair
[Public key known to everyone & Private key only to the owner]
Private Key – Used for making digital signature
Public Key – Used to verify the digital signature
13. Paper signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature
independent of the
document
Signature depends
on the contents of
the document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
V/s
14. • Key Generation
– Random Numbers
– RSA Key Pair [Private/Public Key]
• Digital Signature
– Generate Message Digest
[SHA1]
– Encrypting Digest using Private
Key [Signatures]
– Attaching the Signatures to the
message.
• Verification of Signatures
– Run the test for Authentication,
Integrity and Non repudiation.
• Digital Signature Certificate
– ITU X.509 v3
15. Private key protection
• The Private key generated is
to be protected and kept
secret. The responsibility of
the secrecy of the key lies
with the owner.
• The key is secured using
– PIN Protected soft token
– Smart Cards
– Hardware Tokens
16. PIN protected soft tokens
• The Private key is encrypted
and kept on the Hard Disk in
a file, this file is password
protected.
• This forms the lowest level
of security in protecting the
key, as
– The key is highly reachable.
– PIN can be easily known or
cracked.
• Soft tokens are also not
preferred because
– The key becomes static and
machine dependent.
– The key is in known file
format.
17. Smart Cards
• The Private key is generated
in the crypto module
residing in the smart card.
• The key is kept in the
memory of the smart card.
• The key is highly secured as
it doesn’t leave the card, the
message digest is sent
inside the card for signing,
and the signatures leave the
card.
• The card gives mobility to
the key and signing can be
done on any system. (Having
smart card reader)
18. Hardware Tokens
• They are similar to smart
cards in functionality as
– Key is generated inside the
token.
– Key is highly secured as it
doesn’t leave the token.
– Highly portable.
– Machine Independent.
• iKEY is one of the most
commonly used token as it
doesn’t need a special
reader and can be
connected to the system
using USB port.
21. Public Key Infrastructure (PKI)
• Some Trusted Agency is required which
certifies the association of an individual with
the key pair.
Certifying Authority (CA)
• This association is done by issuing a
certificate to the user by the CA
Public key certificate (PKC)
• All public key certificates are digitally signed
by the CA
22. Certifying Authority
• Must be widely known and trusted
• Must have well defined Identification process before issuing the
certificate
• Provides online access to all the certificates issued
• Provides online access to the list of certificates revoked
• Displays online the license issued by the Controller
• Displays online approved Certification Practice Statement (CPS)
• Must adhere to IT Act/Rules/Regulations and Guidelines
• Must be widely known and trusted
• Must have well defined Identification process before
issuing the certificate
• Provides online access to all the certificates issued
• Provides online access to the list of certificates
revoked
• Displays online the license issued by the Controller
• Displays online approved Certification Practice
Statement (CPS)
• Must adhere to IT Act/Rules/Regulations and
Guidelines
24. Public-Key Certification
Signed
by using
CA’s
private
key
Signed
by using
CA’s
private
key
User
Name &
other
credentials
User
Name &
other
credentials
User’s
Public
key
User’s
Public
key
User Certificate
Certificate
Database
Publis
h
Certificate
Request
User Name
User’s
Public Key
CA’s Name
Validity
Digital
Signature
of CA
Certificate
Class
User’s Email
Address
Serial No.
Key pair
Generation
Private
Public
Web site of CA
User 1 certificate
User 2 certificate
.
Public
License issued
by CCA
25. https://signyourdoc.com/
Private key of CA or CCA require highest level
of security
Hardware Security Module (HSM) is used for
storing the Private Key
More than one person are required for signing
HSM is housed in a strong room with video
surveillance on 24x7 basis.
26. Trust Path
•Controller is the Root certifying authority
responsible for regulating Certifying Authorities
(CAs)
• Controller certifies the association of CA with
his public key
•Certifying Authority (CA) is the trusted
authority responsible for creating or certifying
identities.
•CA certifies the association of an individual with
his public key
27. Role of controller
Controller of Certifying Authorities
as the “Root” Authority certifies the
technologies,infrastructure and
practices of all the Certifying
Authorities licensed to issue Digital
Signature Certificates
28. Summary
• Each individual has a pair of keys
• Public key of each individual is certified by a CA
(Certifying Authority)
• Public keys of CAs are certified by the Controller
• Public key of the Controller is self certified
• Public keys of everyone are known to all concerned
and are also available on the web
• Certification Practice Statement is displayed on the
web site
29. Applications in Judiciary
1. Instant posting of judgment on the web.
2. Secured electronic communications
within judiciary
3. Authentic archiving of Judicial records
4. Submission of affidavits
5. Giving certified copies of the Judgment
30. Applications in Telecommunications
A. Subscribers
Subscriber’s services management
• STD/ISD, Opening, Closing, Initializing Password
Shifting of telephones, Accessories (Clip, Cordless)
Small Payments through telephones bills
• Books, gifts, Internet purchases
Mobile Authentication of SMS
• Share market trading, Intra/Inter office instructions
Mobile Phones as Credit cards
• Mobile operator can venture into credit card business
31. Applications in Telecommunications
(contd.)
B. Internal
Intra/Inter offices authentic communications
• OBs, approvals, Instructions, requests
Procurement of material
• Calling/Receiving bids, Purchase orders, Payment
instructions
Network Management functions
• Change of configuration, Blocking/unblocking
routes
32. Public Key Cryptography
Encryption Technologies
DocumentDocumentDocumentDocument DocumentDocumentDocumentDocumentEncryptedEncrypted
DocumentDocument
EncryptedEncrypted
DocumentDocument
EncryptedEncrypted
DocumentDocument
EncryptedEncrypted
DocumentDocument
Public Key of B
Confidentiality
Private Key of B
33. E-Governance
• Empowering Citizens
a) Transparency
b) Accountability
c) Elimination of Intermediatory
d) Encouraging Citizens to exercise their Rights
34. Government Online
1. Issuing forms and licences
2. Filing tax returns online
3. Online Government orders/treasury
orders
4. Registration
5. Online file movement system
6. Public information records
7. E-voting
8. Railway reservations & ticketing
9. E-education
10. Online money orders