SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Govt. Institute of
Forensic Science, Nagpur
Applied Digital & Cyber Forensics
B.Sc. IIIrd year
Sem.-Vth
Academic Session:- 2018-19
Creation & Verification of Digital Signature
using Digisigner
Presented by,
Rituja R. Gharote
Mamta A. Barmase
Palash A. Mehar
Digital Signature
It is a type of electronic signature that encrypts
documents with digital codes that are particularly
difficult to duplicate.
A digital signature is an authentication
mechanism that enables the creator of message to
attach a code that acts as a signature. The
signature is formed by taking the hash of the
message and encrypting the message with the
creator’s private key .
Digital signature cryptographically bind an
electronic identity to an electronic document and
the signature can not be copied to another
document.
Working of Digital Signatgure
Digital signatures, like handwritten signatures are unique to
each signer. Digital signature solution providers such as Docusign,
follow a specific protocol, called PKI.
The digital signature can be considered as a numerical value
that is represented as a sequence of characters. The creation of a
digital signature is a complex mathematical process that can only be
created by a computer.
Working of Digital Signatgure
Consider a scenario where Alice has to digitally sign a file or an email and send it to bob.
Alice selects the file to be digitally signed or click on the ‘sign in’ her email application.
The hash value of the file content or the message is calculated by Alice’s computer.
This hash value encrypted with Alice signing key (which is private key) to create the digital
signature.
Now the original file or email message along with its digital signature are sent to Bob.
After Bob receives the sign message associated applications ( Email applications) identifies that
the message has been signed, Bob’s computer then proceed to,
Decrypt the digital signature using Alice’s public key
Calculate the hash of original message
Compare the (a) hash it has computed from the received message with the (b) decrypted
hash received with Alice’s message.
Working of Digital Signatgure
Attributes of Digital Signature
Digital signature ensures the confidentiality via. The
following three attributes,
1. Authentication
2. Integrity
3. Non-repudiation
Attributes of Digital Signature
1) Authentication:- Authentication means the act of proving who you say you are.
Authentication means that you know who created and sent the message. Digital
signature is used to authenticate the source of message. It ensures the user of sender.
2) Integrity:- Integrity ensures that when a message is sent over a network, the data
that arrives is the same as the data that was originally sent. Integrity is the assurance
that the information is trustworthy and accurate. Digital signature ensures the
integrity of the message.
3) Non-repudiation:- This is an important criteria of digital signature. As digital
signature ensures the authentication of the message, so the sender can’t repudiate it
later. At the same time it also ensures the identity of the receiver can’t repudiate it
later.
Controller of Certifying Authority(CCA)
The IT Act provides for the Controller of
Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities
and also to ensure that none of the provisions of
the Act are violated. The Certifying Authorities
(CAs) issue Digital Signature Certificates(DSC)
for electronic authentication of users.
The Controller of Certifying Authorities (CCA)
has been appointed by the Central Government
under section 17 of the Act for purposes of the
IT Act. The Office of the CCA came into
existence on November 1, 2000. It aims at
promoting the growth of E-Commerce and E-
Governance through the wide use of digital
signatures.
Sections related to digital signature
Section 47A in The Indian Evidence Act, 1872
47A Opinion as to electronic signature when relevant
When the Court has to form an opinion as to the electronic signature of
any person, the opinion of the Certifying Authority which has issued the Electronic
Signature Certificate is a relevant fact.
Section 73A in The Indian Evidence Act, 1872
Proof as to verification of digital signature.
In order to ascertain whether a digital signature is that of the person by
whom it purports to have been affixed, the Court may direct73A.
Digisigner 4.0
Size :- 8.41 MB
License:- Freeware
Publisher:- Listed programs
Released Date:- 2013/10/21
Operating system:- Windows 2000/XP/Vista/7/8/10
• Features:-
 Audit trail
 Authentication
 Auto reminders
 Customized templates
 Document Analytics
 E-signature
 Mobile signature
 Multi-party signing
 Task progress tracking
Steps of creation of digital signature using
Digisigner
Open a pdf with a Digisigner.
Once the pdf is open, select on signature menu.
Drag the mouse wherever you want to place your sign, Right click on mouse
Either you can use default signature or you can generate your own signature by using the
option generate your own certificate.
Fill your necessary information like name, email, organization’s unit, organization, two-
letter country code etc.
The destination of scoring the key obtained from digital signature should be document
file only.
Give suitable password and click on generate
Once you have generated your own signaturem, you can sign any pdf file click on sign.
Save it with desired name on desired destination.
Steps of Validation of Digital signature using
Digisigner
 Open the pdf you want to validate
with Digisigner
 Either right click on the signature you
want to validate or select validate
signature menu on the extreme right
corner
 This will show whether the signature
is valid or not
Mamta Barmase
Date: 25/07/18
]
Mamta Barmase
Date: 25/07/18
Creation & Verification of Digital Signature using Digisigner

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt5.Examination_of_Typewritten_Documents.ppt
5.Examination_of_Typewritten_Documents.ppt
 
Email recovery
Email recoveryEmail recovery
Email recovery
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Persistence and Recovery Of Hair Evidence.pptx
Persistence and Recovery Of Hair Evidence.pptxPersistence and Recovery Of Hair Evidence.pptx
Persistence and Recovery Of Hair Evidence.pptx
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 

Ähnlich wie Creation & Verification of Digital Signature using Digisigner

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 

Ähnlich wie Creation & Verification of Digital Signature using Digisigner (20)

CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Ds over
Ds overDs over
Ds over
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
 
It act
It actIt act
It act
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 

Mehr von Palash Mehar

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)
Palash Mehar
 

Mehr von Palash Mehar (18)

Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)Disaster Victim Identification (DVI)
Disaster Victim Identification (DVI)
 
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”Alexander Pichushkin :  “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
Alexander Pichushkin : “THE CHESSBOARD KILLER” OR “THE BITSA PARK MANIAC”
 
Rapid DNA Technology
Rapid DNA TechnologyRapid DNA Technology
Rapid DNA Technology
 
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver SomniferumPoisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum
 
Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)Environmental Impact Assessment (EIA)
Environmental Impact Assessment (EIA)
 
Nanotechnology powder
Nanotechnology powderNanotechnology powder
Nanotechnology powder
 
Ninhydrin Analogs
Ninhydrin AnalogsNinhydrin Analogs
Ninhydrin Analogs
 
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye)
 
Polymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf InstrumentPolymerase Chain Reaction Ependorf Instrument
Polymerase Chain Reaction Ependorf Instrument
 
Biomechanics of Injury
Biomechanics of InjuryBiomechanics of Injury
Biomechanics of Injury
 
Forensic Biology Case Study :- The Colin Pitchfork Case
Forensic Biology Case Study :-  The Colin Pitchfork CaseForensic Biology Case Study :-  The Colin Pitchfork Case
Forensic Biology Case Study :- The Colin Pitchfork Case
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Forensic chemistry case study
Forensic chemistry case studyForensic chemistry case study
Forensic chemistry case study
 
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi)
 
Rehabilitation : Principle and its types
Rehabilitation : Principle and its types Rehabilitation : Principle and its types
Rehabilitation : Principle and its types
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
Intelligence tests 01
Intelligence tests 01Intelligence tests 01
Intelligence tests 01
 
Stellar phoenix password recovery
Stellar phoenix password recoveryStellar phoenix password recovery
Stellar phoenix password recovery
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Creation & Verification of Digital Signature using Digisigner

  • 1. Govt. Institute of Forensic Science, Nagpur Applied Digital & Cyber Forensics B.Sc. IIIrd year Sem.-Vth Academic Session:- 2018-19
  • 2. Creation & Verification of Digital Signature using Digisigner Presented by, Rituja R. Gharote Mamta A. Barmase Palash A. Mehar
  • 3. Digital Signature It is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. A digital signature is an authentication mechanism that enables the creator of message to attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator’s private key . Digital signature cryptographically bind an electronic identity to an electronic document and the signature can not be copied to another document.
  • 4. Working of Digital Signatgure Digital signatures, like handwritten signatures are unique to each signer. Digital signature solution providers such as Docusign, follow a specific protocol, called PKI. The digital signature can be considered as a numerical value that is represented as a sequence of characters. The creation of a digital signature is a complex mathematical process that can only be created by a computer.
  • 5. Working of Digital Signatgure Consider a scenario where Alice has to digitally sign a file or an email and send it to bob. Alice selects the file to be digitally signed or click on the ‘sign in’ her email application. The hash value of the file content or the message is calculated by Alice’s computer. This hash value encrypted with Alice signing key (which is private key) to create the digital signature. Now the original file or email message along with its digital signature are sent to Bob. After Bob receives the sign message associated applications ( Email applications) identifies that the message has been signed, Bob’s computer then proceed to, Decrypt the digital signature using Alice’s public key Calculate the hash of original message Compare the (a) hash it has computed from the received message with the (b) decrypted hash received with Alice’s message.
  • 6. Working of Digital Signatgure
  • 7. Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1. Authentication 2. Integrity 3. Non-repudiation
  • 8. Attributes of Digital Signature 1) Authentication:- Authentication means the act of proving who you say you are. Authentication means that you know who created and sent the message. Digital signature is used to authenticate the source of message. It ensures the user of sender. 2) Integrity:- Integrity ensures that when a message is sent over a network, the data that arrives is the same as the data that was originally sent. Integrity is the assurance that the information is trustworthy and accurate. Digital signature ensures the integrity of the message. 3) Non-repudiation:- This is an important criteria of digital signature. As digital signature ensures the authentication of the message, so the sender can’t repudiate it later. At the same time it also ensures the identity of the receiver can’t repudiate it later.
  • 9. Controller of Certifying Authority(CCA) The IT Act provides for the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities and also to ensure that none of the provisions of the Act are violated. The Certifying Authorities (CAs) issue Digital Signature Certificates(DSC) for electronic authentication of users. The Controller of Certifying Authorities (CCA) has been appointed by the Central Government under section 17 of the Act for purposes of the IT Act. The Office of the CCA came into existence on November 1, 2000. It aims at promoting the growth of E-Commerce and E- Governance through the wide use of digital signatures.
  • 10. Sections related to digital signature Section 47A in The Indian Evidence Act, 1872 47A Opinion as to electronic signature when relevant When the Court has to form an opinion as to the electronic signature of any person, the opinion of the Certifying Authority which has issued the Electronic Signature Certificate is a relevant fact. Section 73A in The Indian Evidence Act, 1872 Proof as to verification of digital signature. In order to ascertain whether a digital signature is that of the person by whom it purports to have been affixed, the Court may direct73A.
  • 11. Digisigner 4.0 Size :- 8.41 MB License:- Freeware Publisher:- Listed programs Released Date:- 2013/10/21 Operating system:- Windows 2000/XP/Vista/7/8/10
  • 12. • Features:-  Audit trail  Authentication  Auto reminders  Customized templates  Document Analytics  E-signature  Mobile signature  Multi-party signing  Task progress tracking
  • 13. Steps of creation of digital signature using Digisigner Open a pdf with a Digisigner. Once the pdf is open, select on signature menu. Drag the mouse wherever you want to place your sign, Right click on mouse Either you can use default signature or you can generate your own signature by using the option generate your own certificate. Fill your necessary information like name, email, organization’s unit, organization, two- letter country code etc. The destination of scoring the key obtained from digital signature should be document file only. Give suitable password and click on generate Once you have generated your own signaturem, you can sign any pdf file click on sign. Save it with desired name on desired destination.
  • 14. Steps of Validation of Digital signature using Digisigner  Open the pdf you want to validate with Digisigner  Either right click on the signature you want to validate or select validate signature menu on the extreme right corner  This will show whether the signature is valid or not Mamta Barmase Date: 25/07/18 ] Mamta Barmase Date: 25/07/18