Professional Documents
Culture Documents
DIGITAL SIGNATURE
Contents
What is Digital Signature Why Digital Signature Security Issues Solution Offered History DS Algorithm Key Concepts Working of DS RSA Algorithm Legislation Future Scope
Secure Confidential Integrated Authentic Legal & Non repudiated method of exchanging the electronic documents on networks.
Solutions Offered
Physical World
Authenticity Notaries, Physical Presence, Photo ID card Envelopes
Electronic World
Digital Signature
Encryption
Integrity
NonRepudiation
Signature verification makes use of a public key which corresponds to, but is not the same as, the private key. key. Each user possesses a private and public key pair. pair. Public keys are assumed to be known to the public in general. general. Private keys are never shared. shared. Anyone can verify the signature of a user by employing that user's public key
How Private & Public Keys are used with electronic documents ?
Mr.Agrawals Private Key Mr.Agrawals Public Key
Mr. Agrawal
Agrawals Coworkers Deric Neeraj
Deric
Hello Agrawal , I have some secret message for you, which is in the almirah no.2 at cell no. 1, please take it, immediately Hshvesoesec megeorou,hich isinpppgikfkdjf sdttheellnjnkd sfkkoneeefdaif fsflisfsftheiitks ffsdfdffsf helleekilfksajf thelfak tately
Hshvesoesec megeorou,hic hisinpppgikfk djfsdttheellnj nkdsfkkoneeef daiffsflisfsfthe iitksffsdfdffsf helleekilfksajf thelfak tately
Agrawal
Hello Agrawal , I have some secret message for you, which is in the almirah no.2 at cell no. 1, please take it, immediately
Hash
Message Digest
Cont
Message Digest
Encrypted with Private Key
.
Signature
Agrawals software then encrypts the message digest with his private Key. The result is the digital Signature. Finally, Agrawals software appends the digital signature to documents. All of the data that was hashed has been signed.
Cont
Signature
Append to the document
Now, Mr. Agrawal have a electronic document with signature and send to another co-worker Mr. Neeraj.
First Neerajs software decrypts the signature (using Agrawals public key) changing it back into a message digest. If this worked , then it proves that Agrawal signed the document, because only Agrawal has his private key. Neetajs software then hashes the document data into a message digest. If the message digest is the same as the message digest created when the signature was decrypted, then Neeraj knows that the signed data has not been changed.
Hash
Message Digest
Message Digest
RSA Algorithm
Whitfield diffie and Martin Hellman developed the concept of public key cryptosystem New direction of cryptography . Implementation of public key RSA Algorithm -Ron Rivest, Adi Shamir and Le Adleman Public Key cryptosystem A pair of Keys is extract one Public and one Private Based on 128 bit key Algorithm Private Key to remain secret and Public key to be given to any one
Legislation of different countries concerning the effect and validity of digital signatures are as follows :
Brazil European Union - Medida provisoria 2.200-2 (portuguese) - Directive 1999/93/EC of the European Parliament and of the Council of 13 Dec 1999 on a Community framework for electronic signatures - Electronic Communications Act, 2000
- Qualified Electronic Signatures Act (SFS 2000:832) (in swedish). SFS 2000:832 in english translation - Electronic Transactions Act, 2003 sections 22-24 - Information Technology Act, 2000
Paper
IDRBT Certificate
Electronic
1. Issuing forms and licenses 2. Filing tax returns online 3. Online Government orders/treasury orders 4. Online file movement and approval system 5. Public information records 6. E-voting 7. Online money orders
????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????? ?????????????????????????????????????????????????????????????????????????????