G.L. Bajaj Institute of Management and Research Greater Noida

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Public Key Infrastructure and Applications
Digital Certificate Installation & User Guide For Class-3 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Getting Started To start the process, procure the Digital Signature Certificate Enrollment Kit from Signature World or its Registration Authorities. The.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Prepared & Designed by MIS SECTION MGNREGA, JALPAIGURI
(n)Code Solutions A division of GNFC
Welcome To ITDC e-Procurement
Individual Bidder Enrollment
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signatures NIC-RA, Lucknow. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Digital Signatures eCourt Div. NIC-Hq, New Delhi. An electronic signature duly issued by the certifying authority that shows the authenticity of the person.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
To Be An Authorized DSC Partner of n(code) Digitech To Be An Authorized DSC Partner of n(code) Digitech Warm Greetings from Global Image Technologies Pvt.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Bidder Registration Process
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Digital Gujarat Portal – Citizen User Manual. How Do I Open A Portal? Go to the URL :- Screen 1.1:-
Easy Chair Online Conference Submission, Tracking and Distribution Process: Getting Started AMS WMC and AMS Annual Conferences Click on play to begin show.
Key management issues in PGP
Installation & User Guide
Digital Signatures and Forms
Lecture 4 - Cryptography
Installation & User Guide
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

G.L. Bajaj Institute of Management and Research Greater Noida Welcomes’ PGDM Batch 2015-2017 Digital Signatures Dr. Hamlata Bhat (Assoc. Professor)

What is a Digital Signature.mp4 Signatures What is a Digital Signature.mp4

Electronic Record Very easy to make copies Very fast distribution Easy archiving/store and retrieval Copies are as good as original Easily modifiable Environmental Friendly Because of 4 & 5 together, these lack authenticity

Why Digital Signatures? To provide Authenticity, Integrity and Non -repudiation to electronic documents To use the Internet as the safe and secure medium for e-Governance and e-Commerce One cd rom=one tree

What is Digital Signature? A digital signature is a mathematical scheme (algorithms) for signifying the Authenticity, Integrity and Non –repudiation of a digital message or document.

Digital signatures employ a type of Asymmetric Cryptography Digital signatures employ a type of Asymmetric Cryptography. The Scheme typically consists of three Algorithms A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. A signing algorithm that, given a message and a private key, produces a signature. A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document

Digital Signatures Private Key – Used for making Digital Signature Each individual generates his own key pair [Public key known to everyone & Private key only to the owner] Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature

Hardware Tokens Smart Card iKey

Smart Cards The Private key is generated in the crypto module residing in the smart card. The key is kept in the memory of the smart card. The key is highly secured as it doesn’t leave the card, the message digest is sent inside the card for signing, and the signatures leave the card. The card gives mobility to the key and signing can be done on any system (Having smart card reader).

iKeys or USB Tokens They are similar to smart cards in functionality as Key is generated inside the token. Key is highly secured as it doesn’t leave the token. Highly portable. Machine Independent. iKEY is one of the most commonly used token as it doesn’t need a special reader and can be connected to the system using USB port.

Private Key Protection The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner. The key is secured using PIN Protected soft token Smart Cards Hardware Tokens

Digital Signatures efcc61c1c03db8d8ea8569545c073c814a0ed755 I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 These are digital signatures of same person on different documents Digital Signatures are numbers Same Length – 40 digits They are document content dependent

Paper Signatures V/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free V/s

How To Get & Use Digital Signature

Role of Controller (CCA) Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates

Seven CAs have been licensed by CCA Safescrypt National Informatics Center (NIC), Government of India Institute for Development & Research in Banking Technology (IDRBT) – A Society of Reserve Bank of India Tata Consultancy Services (TCS) MTNL Trust line GNFC (Gujarat Narmada Fertilizer Corporation) E-MudhraCA Department of Electronics & Information Technology Ministry of Communications and Information Technology Government of India Electronics Niketan, 6 CGO Complex New Delhi-110 003 .

1. Application Request Go to http://nicca.nic.in Download DSC Request Form Fill-in the Form Sign the Form at Required Place Get the Form Countersigned and Verified from HOD along with his/her Official Stamp Enclose Identification Proof Enclose Fee (if required) in Form of Bank Draft Send to NIC Office

2. Issuance of Digital Signatures Send your completed form to NIC UP State Unit Office Once your form is found satisfactory and the fee is properly submitted, the form is counter signed by NIC, HoD. The form is then forwarded to NIC Certifying Authority Office (NIC-RA, Kendriya Bhawan, Lucknow) for processing. When your case is processed a Membership ID and Password is Issued and send to the email ID mentioned in Application Form. A Digital Signature in USB Token or Smart Card can be collected from NIC-RA Office at Lucknow

3. Accessing Website with Membership ID for Enrollment of Request On line

Accessing Website with Membership ID for Enrollment of Request On line

How to make Request Insert the USB Pen Drive /Smart Card Reader in your computer system Insert the Smart Card in the Reader ( In case of Smart Card ) Download USB/Smart Card Driver from NICCA website (http://nicca.nic.in) Unzip and Double Click the Downloaded File When the Proper Driver is loaded From Token Administration, Device will get Operational

4. Driver Downloading

Please Click Download Smart Card USB E-token Driver Link

Select Your Media Type

5.Enrollment Process

Click Member Login

Enter User ID and Password and click Submit Button User Id and Password are Same

Select Enroll Button

Fill form and select SafeSign Cryptographic Service Provider in Cryptographic Service Provider Dropdown

After Filling Form and Cryptographic Service Provider Select option ‘Generate Request’

You will receive email from nicca. nic You will receive email from nicca.nic.in when your Certificate is generated view status for downloaded Certificates

If your Certificate is generated then click your Request No If your Certificate is generated then click your Request No. and enter Authentication Pin (Authentication Pin is send to your e-mail id by nicca.nic.in) and click download Button.

To Check if Certificate is available in Device

For Accessing Web Services Go to Web Portal like http://edistrict.nic.in or http://ssdg.up.nic.in Plug-in the USB/Smart Card in the computer system/ laptop While Digitally Signing in Browser window your name will be pop up automatically, which you can select Further it will ask for PIN that is unique to your Card.

Prevention From Misuse Do’t Hand over you DSC Media USB/Card to any one Do’t tell your PIN to anyone Document Digitally Signed carries same legal status as manually signing as per the IT Act

How do I view Digital Certificates on my PC? For MS Internet Explorer Users: 1. Open your MS Internet Explorer 2. Click on the Tools menu 3. From the drop down list select Internet Options 4. Click the Content tab 5. Click the Certificates button --------------------------------------------------- If you have enrolled for one (or more), your Digital Certificates will appear within the Personal section. If you have received or downloaded Other People's Digital Certificates, they will appear in the Other People section. You may also view all Intermediary and Root Certificates (belonging to Certification Authorities from this Manager.

Digital Signature software companies RightSignature-rightsignature.com Sky Signature- skysignature.com CoSign- www.cosign PDF Sign&Seal - ascertia.com AssureSign- assuresign.com EchoSign- echosign.adobe.com

What are the different classes of Digital Signature Certificates? Class 0 Certificate: This certificate shall be issued only for demonstration/ test purposes. Class 1 Certificate: Class 1 certificates shall be issued to individuals. These certificates will confirm that user's name and E-mail address form an unambiguous subject within the Certifying Authorities database. Class 2 Certificate: These certificates will be issued for both private business individual/ Govt. employees .These certificates will confirm that the information in the application provided by the subscriber does not conflict with the information in well-recognized consumer databases.  Class 3 Certificate: This certificate will be issued to individual as well as organizations. As these are high assurance certificates, primarily intended for e-commerce applications, they shall be issued to individuals only on their personal (physical) appearance before the Certifying Authorities.

Thank You