Digital Signatures NIC-RA, Lucknow. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Digital Certificate Installation & User Guide For Class-3 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Prepared & Designed by MIS SECTION MGNREGA, JALPAIGURI
(n)Code Solutions A division of GNFC
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Chapter 10: Authentication Guide to Computer Network Security.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Digital Signatures eCourt Div. NIC-Hq, New Delhi. An electronic signature duly issued by the certifying authority that shows the authenticity of the person.
G.L. Bajaj Institute of Management and Research Greater Noida
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Digital Signatures, Message Digest and Authentication Week-9.
To Be An Authorized DSC Partner of n(code) Digitech To Be An Authorized DSC Partner of n(code) Digitech Warm Greetings from Global Image Technologies Pvt.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Bidder Registration Process
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
TAG Presentation 18th May 2004 Paul Butler
Installation & User Guide
Digital Signatures and Forms
E-cert (Digital Certificate)
Lecture 4 - Cryptography
Installation & User Guide
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Presentation transcript:

Digital Signatures NIC-RA, Lucknow

Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original 5.Easily modifiable 6.Environmental Friendly Because of 4 & 5 together, these lack authenticity

Why Digital Signatures? To provide Authenticity, Integrity and Non - repudiation to electronic documents To use the Internet as the safe and secure medium for e-Governance and e- Commerce

What is Digital Signature?  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit

Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document

Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature

Smart Card iKey Hardware Tokens

Smart Cards The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system (Having smart card reader).

iKeys or USB Tokens They are similar to smart cards in functionality as –Key is generated inside the token. –Key is highly secured as it doesn’t leave the token. –Highly portable. –Machine Independent. iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.

Private Key Protection The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. The key is secured using –PIN Protected soft token –Smart Cards –Hardware Tokens

Digital Signatures Digital Signatures are numbers Same Length – 40 digits They are document content dependent I agree efcc61c1c03db8d8ea c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e d97d315dff1ea3 These are digital signatures of same person on different documents

Paper Signatures V/s Digital Signatures ParameterPaperElectronic Authenticity May be forgedCan not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a.Handwriting expert needed b.Error prone a.Any computer user b.Error free V/s

Role of Controller (CCA) Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates

Seven CAs have been licensed by CCA  Safescrypt  National Informatics Center (NIC), Government of India  Institute for Development & Research in Banking Technology (IDRBT) – A Spciety of Reserve Bank of India  Tata Consultancy Services (TCS)  MTNL Trustline  GNFC (Gujarat Narmada Fertilizer Corporation)  E-MudhraCA

How To Get & Use Digital Signature

Application Request  Go to  Download DSC Request Form  Fill-in the Form  Sign the Form at Required Place  Get the Form Countersigned and Verified from HOD along with his/her Official Stamp  Enclose Identification Proof  Enclose Fee (if required) in Form of Bank Draft  Send to NIC Office

Issuance of Digital Signatures  Send your completed form to NIC UP State Unit Office  Once your form is found satisfactory and the fee is properly submitted, the form is counter signed by NIC, HoD.  The form is then forwarded to NIC Certifying Authority Office (NIC-RA, Kendriya Bhawan, Lucknow) for processing.  When your case is processed a Membership ID and Password is Issued and send to the ID mentioned in Application Form.  A Digital Signature in USB Token or Smart Card can be collected from NIC-RA Office at Lucknow

Accessing Website with Membership ID for Enrollment of Request On line

How to make Request  Insert the USB Pen Drive /Smart Card Reader in your computer system  Insert the Smart Card in the Reader ( In case of Smart Card )  Download USB/Smart Card Driver from NICCA website (  Unzip and Double Click the Downloaded File  When the Proper Driver is loaded From Token Administration, Device will get Operational

Driver Downloading

Please Click Download Smart Card USB E-token Driver Link

Select Your Media Type

Enrollment Process

Click Member Login

Enter User ID and Password and click Submit Button User Id and Password are Same

Click Step 1 or Enroll Button

Fill form and select SafeSign Cryptographic Service Provider in Cryptographic Service Provider Dropdown

After Filling Form and Cryptographic Service Provider Select option ‘Generate Request’

You will receive from nicca.nic.in when your Certificate is generated click step-4 or view status for downloaded Certificates

If your Certificate is generated then click your Request No. and enter Authentication Pin (Authentication Pin is send to your id by nicca.nic.in) and click download Button.

To Check if Certificate is available in Device

For Accessing Web Services  Go to Web Portal like or  Plug-in the USB/Smart Card in the computer system/ laptop  While Digitally Signing in Browser window your name will be pop up automatically, which you can select  Further it will ask for PIN that is unique to your Card.

Prevention From Misuse  Do’t Hand over you DSC Media USB/Card to any one  Do’t tell your PIN to anyone  Document Digitally Signed carries same legal status as manually signing as per the IT Act

Thank You