SlideShare a Scribd company logo
Govt. Institute of
Forensic Science, Nagpur
Applied Digital & Cyber Forensics
B.Sc. IIIrd year
Sem.-Vth
Academic Session:- 2018-19
Creation & Verification of Digital Signature
using Digisigner
Presented by,
Rituja R. Gharote
Mamta A. Barmase
Palash A. Mehar
Digital Signature
It is a type of electronic signature that encrypts
documents with digital codes that are particularly
difficult to duplicate.
A digital signature is an authentication
mechanism that enables the creator of message to
attach a code that acts as a signature. The
signature is formed by taking the hash of the
message and encrypting the message with the
creator’s private key .
Digital signature cryptographically bind an
electronic identity to an electronic document and
the signature can not be copied to another
document.
Working of Digital Signatgure
Digital signatures, like handwritten signatures are unique to
each signer. Digital signature solution providers such as Docusign,
follow a specific protocol, called PKI.
The digital signature can be considered as a numerical value
that is represented as a sequence of characters. The creation of a
digital signature is a complex mathematical process that can only be
created by a computer.
Working of Digital Signatgure
Consider a scenario where Alice has to digitally sign a file or an email and send it to bob.
Alice selects the file to be digitally signed or click on the ‘sign in’ her email application.
The hash value of the file content or the message is calculated by Alice’s computer.
This hash value encrypted with Alice signing key (which is private key) to create the digital
signature.
Now the original file or email message along with its digital signature are sent to Bob.
After Bob receives the sign message associated applications ( Email applications) identifies that
the message has been signed, Bob’s computer then proceed to,
Decrypt the digital signature using Alice’s public key
Calculate the hash of original message
Compare the (a) hash it has computed from the received message with the (b) decrypted
hash received with Alice’s message.
Working of Digital Signatgure
Attributes of Digital Signature
Digital signature ensures the confidentiality via. The
following three attributes,
1. Authentication
2. Integrity
3. Non-repudiation
Attributes of Digital Signature
1) Authentication:- Authentication means the act of proving who you say you are.
Authentication means that you know who created and sent the message. Digital
signature is used to authenticate the source of message. It ensures the user of sender.
2) Integrity:- Integrity ensures that when a message is sent over a network, the data
that arrives is the same as the data that was originally sent. Integrity is the assurance
that the information is trustworthy and accurate. Digital signature ensures the
integrity of the message.
3) Non-repudiation:- This is an important criteria of digital signature. As digital
signature ensures the authentication of the message, so the sender can’t repudiate it
later. At the same time it also ensures the identity of the receiver can’t repudiate it
later.
Controller of Certifying Authority(CCA)
The IT Act provides for the Controller of
Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities
and also to ensure that none of the provisions of
the Act are violated. The Certifying Authorities
(CAs) issue Digital Signature Certificates(DSC)
for electronic authentication of users.
The Controller of Certifying Authorities (CCA)
has been appointed by the Central Government
under section 17 of the Act for purposes of the
IT Act. The Office of the CCA came into
existence on November 1, 2000. It aims at
promoting the growth of E-Commerce and E-
Governance through the wide use of digital
signatures.
Sections related to digital signature
Section 47A in The Indian Evidence Act, 1872
47A Opinion as to electronic signature when relevant
When the Court has to form an opinion as to the electronic signature of
any person, the opinion of the Certifying Authority which has issued the Electronic
Signature Certificate is a relevant fact.
Section 73A in The Indian Evidence Act, 1872
Proof as to verification of digital signature.
In order to ascertain whether a digital signature is that of the person by
whom it purports to have been affixed, the Court may direct73A.
Digisigner 4.0
Size :- 8.41 MB
License:- Freeware
Publisher:- Listed programs
Released Date:- 2013/10/21
Operating system:- Windows 2000/XP/Vista/7/8/10
• Features:-
 Audit trail
 Authentication
 Auto reminders
 Customized templates
 Document Analytics
 E-signature
 Mobile signature
 Multi-party signing
 Task progress tracking
Steps of creation of digital signature using
Digisigner
Open a pdf with a Digisigner.
Once the pdf is open, select on signature menu.
Drag the mouse wherever you want to place your sign, Right click on mouse
Either you can use default signature or you can generate your own signature by using the
option generate your own certificate.
Fill your necessary information like name, email, organization’s unit, organization, two-
letter country code etc.
The destination of scoring the key obtained from digital signature should be document
file only.
Give suitable password and click on generate
Once you have generated your own signaturem, you can sign any pdf file click on sign.
Save it with desired name on desired destination.
Steps of Validation of Digital signature using
Digisigner
 Open the pdf you want to validate
with Digisigner
 Either right click on the signature you
want to validate or select validate
signature menu on the extreme right
corner
 This will show whether the signature
is valid or not
Mamta Barmase
Date: 25/07/18
]
Mamta Barmase
Date: 25/07/18
Creation & Verification of Digital Signature using Digisigner

More Related Content

What's hot

8._Ink_Examination.ppt
8._Ink_Examination.ppt8._Ink_Examination.ppt
8._Ink_Examination.ppt
PallaviKumari112
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
kiran malik
 
FORGERY.ppt
FORGERY.pptFORGERY.ppt
FORGERY.ppt
PallaviKumari112
 
Seal impressions
Seal impressionsSeal impressions
Seal impressions
Chhavi Agarwal
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
Elliot Ward
 
Digital signature
Digital signatureDigital signature
Digital signature
Filipp Kolobov
 
influence of writing instrument on handwriting
influence of writing instrument on handwritinginfluence of writing instrument on handwriting
influence of writing instrument on handwriting
Mahipreet Kaur
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
ShanmukhaValli3
 
Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents Analysis
Bob Smullen
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
RakeshPandey951330
 
Information and Technology Act
Information and Technology ActInformation and Technology Act
Information and Technology Act
Applied Forensic Research Sciences
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
Bhupeshkumar Nanhe
 
voice recognition
voice recognition voice recognition
voice recognition
Hemant Jain
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx
Applied Forensic Research Sciences
 
Examination of mechanical impression
Examination of mechanical impressionExamination of mechanical impression
Examination of mechanical impression
PriyakankshaMishra
 
Comparative study of security features of passports of different countries
Comparative study of security features of passports of different countriesComparative study of security features of passports of different countries
Comparative study of security features of passports of different countries
Akashlina Basu
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
Shreyas Patel
 

What's hot (20)

8._Ink_Examination.ppt
8._Ink_Examination.ppt8._Ink_Examination.ppt
8._Ink_Examination.ppt
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
 
FORGERY.ppt
FORGERY.pptFORGERY.ppt
FORGERY.ppt
 
Seal impressions
Seal impressionsSeal impressions
Seal impressions
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
 
Digital signature
Digital signatureDigital signature
Digital signature
 
influence of writing instrument on handwriting
influence of writing instrument on handwritinginfluence of writing instrument on handwriting
influence of writing instrument on handwriting
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
 
Hand Writing and Documents Analysis
Hand Writing and Documents AnalysisHand Writing and Documents Analysis
Hand Writing and Documents Analysis
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
Information and Technology Act
Information and Technology ActInformation and Technology Act
Information and Technology Act
 
Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
voice recognition
voice recognition voice recognition
voice recognition
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx(PART-I)-Development of latent fingerprints by powders method.pptx
(PART-I)-Development of latent fingerprints by powders method.pptx
 
Examination of mechanical impression
Examination of mechanical impressionExamination of mechanical impression
Examination of mechanical impression
 
Comparative study of security features of passports of different countries
Comparative study of security features of passports of different countriesComparative study of security features of passports of different countries
Comparative study of security features of passports of different countries
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
 

Similar to Creation & Verification of Digital Signature using Digisigner

Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Dsc ppt
Dsc  pptDsc  ppt
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
Palash Mehar
 
D.Silpa
D.SilpaD.Silpa
Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
RajanGoyal16
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
 
Digital signature
Digital signatureDigital signature
Digital signature
Naimur Rahman
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Ds over
Ds overDs over
Ds over
jolly9293
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
DigitalSignatureOnli
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 

Similar to Creation & Verification of Digital Signature using Digisigner (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Ds over
Ds overDs over
Ds over
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
 
Digital signature
Digital signatureDigital signature
Digital signature
 

More from Palash Mehar

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)
Palash Mehar
 
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Palash Mehar
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA Technology
Palash Mehar
 
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPoisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Palash Mehar
 
Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)
Palash Mehar
 
Nanotechnology powder
Nanotechnology powderNanotechnology powder
Nanotechnology powder
Palash Mehar
 
Ninhydrin Analogs
Ninhydrin AnalogsNinhydrin Analogs
Ninhydrin Analogs
Palash Mehar
 
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Palash Mehar
 
Polymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPolymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf Instrument
Palash Mehar
 
Biomechanics of Injury
Biomechanics of InjuryBiomechanics of Injury
Biomechanics of Injury
Palash Mehar
 
Forensic Biology Case Study :- The Colin Pitchfork Case
Forensic Biology Case Study :-  The Colin Pitchfork CaseForensic Biology Case Study :-  The Colin Pitchfork Case
Forensic Biology Case Study :- The Colin Pitchfork Case
Palash Mehar
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
Palash Mehar
 
Forensic chemistry case study
Forensic chemistry case studyForensic chemistry case study
Forensic chemistry case study
Palash Mehar
 
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Palash Mehar
 
Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Rehabilitation : Principle and its types
Rehabilitation : Principle and its types
Palash Mehar
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
Palash Mehar
 
Email recovery
Email recoveryEmail recovery
Email recovery
Palash Mehar
 
Intelligence tests 01
Intelligence tests 01Intelligence tests 01
Intelligence tests 01
Palash Mehar
 
Stellar phoenix password recovery
Stellar phoenix password recoveryStellar phoenix password recovery
Stellar phoenix password recovery
Palash Mehar
 

More from Palash Mehar (19)

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)
 
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA Technology
 
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPoisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
 
Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)
 
Nanotechnology powder
Nanotechnology powderNanotechnology powder
Nanotechnology powder
 
Ninhydrin Analogs
Ninhydrin AnalogsNinhydrin Analogs
Ninhydrin Analogs
 
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
 
Polymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPolymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf Instrument
 
Biomechanics of Injury
Biomechanics of InjuryBiomechanics of Injury
Biomechanics of Injury
 
Forensic Biology Case Study :- The Colin Pitchfork Case
Forensic Biology Case Study :-  The Colin Pitchfork CaseForensic Biology Case Study :-  The Colin Pitchfork Case
Forensic Biology Case Study :- The Colin Pitchfork Case
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Forensic chemistry case study
Forensic chemistry case studyForensic chemistry case study
Forensic chemistry case study
 
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
 
Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Rehabilitation : Principle and its types
Rehabilitation : Principle and its types
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
Email recovery
Email recoveryEmail recovery
Email recovery
 
Intelligence tests 01
Intelligence tests 01Intelligence tests 01
Intelligence tests 01
 
Stellar phoenix password recovery
Stellar phoenix password recoveryStellar phoenix password recovery
Stellar phoenix password recovery
 

Recently uploaded

What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

Creation & Verification of Digital Signature using Digisigner

  • 1. Govt. Institute of Forensic Science, Nagpur Applied Digital & Cyber Forensics B.Sc. IIIrd year Sem.-Vth Academic Session:- 2018-19
  • 2. Creation & Verification of Digital Signature using Digisigner Presented by, Rituja R. Gharote Mamta A. Barmase Palash A. Mehar
  • 3. Digital Signature It is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. A digital signature is an authentication mechanism that enables the creator of message to attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator’s private key . Digital signature cryptographically bind an electronic identity to an electronic document and the signature can not be copied to another document.
  • 4. Working of Digital Signatgure Digital signatures, like handwritten signatures are unique to each signer. Digital signature solution providers such as Docusign, follow a specific protocol, called PKI. The digital signature can be considered as a numerical value that is represented as a sequence of characters. The creation of a digital signature is a complex mathematical process that can only be created by a computer.
  • 5. Working of Digital Signatgure Consider a scenario where Alice has to digitally sign a file or an email and send it to bob. Alice selects the file to be digitally signed or click on the ‘sign in’ her email application. The hash value of the file content or the message is calculated by Alice’s computer. This hash value encrypted with Alice signing key (which is private key) to create the digital signature. Now the original file or email message along with its digital signature are sent to Bob. After Bob receives the sign message associated applications ( Email applications) identifies that the message has been signed, Bob’s computer then proceed to, Decrypt the digital signature using Alice’s public key Calculate the hash of original message Compare the (a) hash it has computed from the received message with the (b) decrypted hash received with Alice’s message.
  • 6. Working of Digital Signatgure
  • 7. Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1. Authentication 2. Integrity 3. Non-repudiation
  • 8. Attributes of Digital Signature 1) Authentication:- Authentication means the act of proving who you say you are. Authentication means that you know who created and sent the message. Digital signature is used to authenticate the source of message. It ensures the user of sender. 2) Integrity:- Integrity ensures that when a message is sent over a network, the data that arrives is the same as the data that was originally sent. Integrity is the assurance that the information is trustworthy and accurate. Digital signature ensures the integrity of the message. 3) Non-repudiation:- This is an important criteria of digital signature. As digital signature ensures the authentication of the message, so the sender can’t repudiate it later. At the same time it also ensures the identity of the receiver can’t repudiate it later.
  • 9. Controller of Certifying Authority(CCA) The IT Act provides for the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities and also to ensure that none of the provisions of the Act are violated. The Certifying Authorities (CAs) issue Digital Signature Certificates(DSC) for electronic authentication of users. The Controller of Certifying Authorities (CCA) has been appointed by the Central Government under section 17 of the Act for purposes of the IT Act. The Office of the CCA came into existence on November 1, 2000. It aims at promoting the growth of E-Commerce and E- Governance through the wide use of digital signatures.
  • 10. Sections related to digital signature Section 47A in The Indian Evidence Act, 1872 47A Opinion as to electronic signature when relevant When the Court has to form an opinion as to the electronic signature of any person, the opinion of the Certifying Authority which has issued the Electronic Signature Certificate is a relevant fact. Section 73A in The Indian Evidence Act, 1872 Proof as to verification of digital signature. In order to ascertain whether a digital signature is that of the person by whom it purports to have been affixed, the Court may direct73A.
  • 11. Digisigner 4.0 Size :- 8.41 MB License:- Freeware Publisher:- Listed programs Released Date:- 2013/10/21 Operating system:- Windows 2000/XP/Vista/7/8/10
  • 12. • Features:-  Audit trail  Authentication  Auto reminders  Customized templates  Document Analytics  E-signature  Mobile signature  Multi-party signing  Task progress tracking
  • 13. Steps of creation of digital signature using Digisigner Open a pdf with a Digisigner. Once the pdf is open, select on signature menu. Drag the mouse wherever you want to place your sign, Right click on mouse Either you can use default signature or you can generate your own signature by using the option generate your own certificate. Fill your necessary information like name, email, organization’s unit, organization, two- letter country code etc. The destination of scoring the key obtained from digital signature should be document file only. Give suitable password and click on generate Once you have generated your own signaturem, you can sign any pdf file click on sign. Save it with desired name on desired destination.
  • 14. Steps of Validation of Digital signature using Digisigner  Open the pdf you want to validate with Digisigner  Either right click on the signature you want to validate or select validate signature menu on the extreme right corner  This will show whether the signature is valid or not Mamta Barmase Date: 25/07/18 ] Mamta Barmase Date: 25/07/18