SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Digital Signature & eSign
(An Overview)
e-Hastakshar (eSign) Workshop for
Application Service Providers (ASP)
17-18 December, 2015
Rishi Pathak – C-DAC
Outline of Talk
• What are Digital Signatures
• Cryptographic hash functions
• Asymmetric cryptography
• PKI & DSC
• PKCS#7
• eSign
Introduction
• Digital Signatures are synonymous to
handwritten signature or stamped seal
• Mathematical technique for validating
– Authenticity and integrity of a message, software
or digital document
• Gained legal validity as per Indian IT Act 2000
Paper Signatures v/s Digital Signatures
Properties Paper Electronic
Authenticity May be forged Cannot be copied
Integrity Signature independent of
the document
Signature depends on the
contents of the document
Non-repudiation • Handwriting expert
needed
• Error prone
• Any computer user
• Error free
PKCS & X509 Standards
• PKCS 1 :
– Properties and format of RSA key pairs
– Algorithms for encryption/decryption, signing/verification
• PKCS 7
– Cryptographic Message Syntax (CMS) Standard
• PKCS 10
– Certificate Signing Request (CSR) Syntax Standard
• PKCS 9 : Extended attributes for CMS and CSR
– Signing Time, NONCE, Sequence, Counter Signature
– DOB, Certificate Extensions, Name, Gender, Name & Address etc.
• X509 version 3 and 2 :
– Digital Signature Certificate(DSC), Certificate Revocation List(CRL)
• PKCS 11 : Cryptographic Token Interface Standard
– An API for signing and verifying data by a device that holds the key
(Hardware Tokens, HSM)
Associations in Digital Signature
• Document content :: Hash (Digital fingerprint)
• Hash :: Private key (Secret)
• Private key :: Public key (Known to everyone)
• Public key :: Certificate (Identity)
• Certificate :: CA (Trusted third party)
• CA :: RCAI (Root Certificate Authority of INDIA)
Building Blocks
• Cryptographic hash functions
– Integrity
• Asymmetric cryptography
– Authentication
• PKI (Public Key Infrastructure)
– Identity
– Non repudiation
Cryptographic Hash Functions
• Uniquely maps data of arbitrary size onto a fixed length
string
• Iterative one way compression
• Use cases : password, hash tables, caches, finding
duplicate records etc.
• Uses in cryptography - HMAC & Digital Signatures
• Properties
– Pre-image resistance : Infeasible to generate a message
from its hash
– Second pre-image resistance : Given a hash, difficult to
find another message with same hash
– Collision resistance : No two different messages with same
hash
Symmetric Cryptography
• Same key is used for
encryption and decryption
• Challenge
– Key distribution
– Key management
• Non Repudiation ?
Public Key Cryptography
• Employs asymmetric(mathematically related)
keys(key pairs) for encryption and decryption
• RSA, DSA, ECDSA
• Key used to encrypt differs from key to be
used for decryption
• Encryption using Public key
• Signing using Private key
Public Key Cryptography
• Strength lies in computational impracticality in
deducing Private key from Public key
• Security lies in protecting Private key
• Uses include Public key encryption and Digital
Signatures
• Computational complexity limits usage for
short messages
• Also used in hand shaking for secure exchange
of symmetric keys in SSL/TLS
Signing & Verification- Flow
Signing & Verification- Example
Public Key Infrastructure
• PKI – Public Key Infrastructure ecosystem is an intersection of:
• Cryptography (Math) – Cryptographers/Researchers
• Technology & Implementation – PKI System Developer
• Policy & Law – PKI System & Users
• Application
• Subject Authentication
• Certificate Generation
• Certificate Distribution
• Certificate Revocation
PKI - Registration/Certification
Certificate Authority
• Certifying authority is an entity which issues Digital Certificate
• It is a Trusted third party
• CA’s are the important characteristics of Public Key
Infrastructure (PKI)
Responsibilities of CA
• Verify the credentials of the person requesting for the
certificate (RA’s responsibility)
• Issue certificates
• Revoke certificate
• Generate and upload CRL
• Maintain & update certificate repository
• Make available Certification Practice Statement
PKI - India
• Strictly hierarchal trust path model
• CCA operates Root Certificate Authority of India(self signed certificate)
• Only one level of sub Certifying Authorities(max 4 certs a chain)
• Necessitates issuance of end entity certificates only through its sub-CA
Digital Signature Certificate
A Public Key Certificate is an electronic
document used to prove ownership of a public
key.
The certificate includes :
• Information about its owner's identity(Subject),
• Information about the key,
• The Digital Signature of an entity that has verified
the certificate's contents are correct(Issuer CA in
PKI)
X.509
X509 is ITU-T standard for PKI
Defines formats for:
• Digital Certificates – Version3
• CRL – Version 2
• Certificate Path Validation
• Distinguished Name
X.509 v3 Certificate
• Version (3)
• Serial Number
• Signature Algorithm
Identifier
• Issuer Name
• Validity Period
• Not before
• Not after
• Subject Name
• Subject Public Key
Information
• Public key algorithm
• Subject public key
• Optional Fields
• Extensions(optional)
C-DAC CA Certificate
X.509 v3 Certificate
Class of certificate : “Aadhaar-eKYC – OTP”
Mandatorily included in the Subject
Varying Pseudonym guarantees unique
Subject for same Aadhaar holder
X.509 v3 Extension
Associate additional information for subjects, public
keys and certificate revocation lists
• Extension type
• Extension value
• Criticality indicator
Key Usage(Critical) : Digital Signatures, Non
Repudiation
CRL distribution points
Certificate Policies
Certification Practice Statement(CPS)
PKCS#7
• Specifies a syntax for digital envelopes and digital
signatures
• Widely used in many applications for enveloping
and authenticating messages, and for distribution
of certificates and certificate revocation lists
• PKCS#7 Content-Type : SignedData for Digital
Signatures
Abstract Syntax Notation 1
1. The rules of syntax for describing the contents of a
message in terms of data type and content
sequence or structure
2. How you actually encode each data item in a
message – BER & DER(Identifier-Length-Content),
XER etc.
Age ::= INTEGER (0..7)
User ::= SEQUENCE {
name IA5String (SIZE(1..128)),
age Age,
address IA5String OPTIONAL,
}
Data Types : BOOLEAN, INTEGER, BIT STRING, OCTET STRING, NULL,
REAL, ENUMERATED, GeneralizedTime, IA5String, UTF8String
Constructors : SEQUENCE, SET
PKCS#7 - SignedData
Supports multiple signers/signatures
PKCS#7 - SignerInfos
PKCS#7
What is Digested and Signed
• RAW
• Hash of the message
• Does not contain information on DigestAlgorithm
• PKCS#7
• EncryptedDigest ASN1 structure
• Contains both hash & DigestAlgorithm
• AuthenticatedAttributes in case they are present
PKCS#7 - EncryptedDigest
ASN1 Definition of EncryptedDigest
ASN1 Parse of Decrypted EncryptedDigest
PKCS#7 – SigningTime
• AuthenticatedAttributes DER
encoded ASN1 structure is digested
• This forms an association of
message & signing time with the
signature
AuthenticatedAttributes include
• SigningTime
• MessageDigest and other attributes
PKCS#7 - Signatures Types
1. Single signature
– One signer and his/her signature on a document
2. Parallel signature
– Multiple signer and their signature on a document
3. Counter signature
– Hierarchy of signatures
– UnauthenticatedAttributes contains SignerInfos for counter signer
– Signature is on EncryptedDigest of previous signer
– Recursive in nature
Signature container may OR may not include content on which digital
signature was created
1. Attached PKCS#7 signature
2. Detached PKCS#7 signature
Without eSign
Subscriber :
• Application to CA for DSC (soft/hard mode)
• Key generation and safe custody(iToken, Smart card)
PKI :
• Manual verification of credentials (VA)
• Issuance & communication of DSC
Limited by :
• Not online
• Time taken for ascertaining subscribers identity
• Key management, accessibility and cost
Mass adoption and integration with services
eSign
Electronic Authentication Techniques & Procedure Rules, 2015
- Legal validity to authentication & eKYC using Aadhaar
eSign facilitates Digital Signatures by an Aadhaar
holder
– Registered & active mobile number is a
prerequisite
– OTP and Biometric authentication methods
– eKYC treated as verified PoI and PoA
(Registration)
Thank You
Q/A

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
DigiLocker-presentation
DigiLocker-presentationDigiLocker-presentation
DigiLocker-presentation
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
What are the features of DigiLocker?
What are the features of DigiLocker?What are the features of DigiLocker?
What are the features of DigiLocker?
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 

Andere mochten auch

HPC Application Profiling & Analysis
HPC Application Profiling & AnalysisHPC Application Profiling & Analysis
HPC Application Profiling & AnalysisRishi Pathak
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Podpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiePodpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiepodpisani .pl
 
Google Partners - Adwords
Google Partners - AdwordsGoogle Partners - Adwords
Google Partners - Adwordsjohnbrito123
 
SIG Is Opening Doors Worldwide
SIG Is Opening Doors WorldwideSIG Is Opening Doors Worldwide
SIG Is Opening Doors WorldwideSAP Ariba
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gatewayKartik Kalpande Patil
 
Customer experience drives e-signature adoption
Customer experience drives e-signature adoptionCustomer experience drives e-signature adoption
Customer experience drives e-signature adoptionDocuSign
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway SystemMannu Khani
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Bitcoin Association of Australia
 
Partner Presentation - Digital Media & Amazon Web Services, cloudreach
Partner Presentation - Digital Media & Amazon Web Services, cloudreachPartner Presentation - Digital Media & Amazon Web Services, cloudreach
Partner Presentation - Digital Media & Amazon Web Services, cloudreachAmazon Web Services
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Angelin R
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)fentrekin
 
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...Ryan Rosario
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development processRiant Soft
 

Andere mochten auch (18)

HPC Application Profiling & Analysis
HPC Application Profiling & AnalysisHPC Application Profiling & Analysis
HPC Application Profiling & Analysis
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Podpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiePodpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesie
 
Google Partners - Adwords
Google Partners - AdwordsGoogle Partners - Adwords
Google Partners - Adwords
 
SIG Is Opening Doors Worldwide
SIG Is Opening Doors WorldwideSIG Is Opening Doors Worldwide
SIG Is Opening Doors Worldwide
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Customer experience drives e-signature adoption
Customer experience drives e-signature adoptionCustomer experience drives e-signature adoption
Customer experience drives e-signature adoption
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Partner Presentation - Digital Media & Amazon Web Services, cloudreach
Partner Presentation - Digital Media & Amazon Web Services, cloudreachPartner Presentation - Digital Media & Amazon Web Services, cloudreach
Partner Presentation - Digital Media & Amazon Web Services, cloudreach
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...
Taking R to the Limit (High Performance Computing in R), Part 1 -- Paralleliz...
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
 

Ähnlich wie Digital signature & eSign overview

Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsDavid Ochel
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki conceptMostafa El Lathy
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer securityMaarten Smeets
 
"Mobile security: iOS", Yaroslav Vorontsov, DataArt
"Mobile security: iOS", Yaroslav Vorontsov, DataArt"Mobile security: iOS", Yaroslav Vorontsov, DataArt
"Mobile security: iOS", Yaroslav Vorontsov, DataArtDataArt
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)Christopher Allen
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006Nate Lawson
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 

Ähnlich wie Digital signature & eSign overview (20)

Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Deep Dive In To Kerberos
Deep Dive In To KerberosDeep Dive In To Kerberos
Deep Dive In To Kerberos
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 
"Mobile security: iOS", Yaroslav Vorontsov, DataArt
"Mobile security: iOS", Yaroslav Vorontsov, DataArt"Mobile security: iOS", Yaroslav Vorontsov, DataArt
"Mobile security: iOS", Yaroslav Vorontsov, DataArt
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Null talk
Null talkNull talk
Null talk
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)
Smart Signatures—Experiments in Authentication (Stanford BPASE 2018 final)
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Kürzlich hochgeladen (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 

Digital signature & eSign overview

  • 1. Digital Signature & eSign (An Overview) e-Hastakshar (eSign) Workshop for Application Service Providers (ASP) 17-18 December, 2015 Rishi Pathak – C-DAC
  • 2. Outline of Talk • What are Digital Signatures • Cryptographic hash functions • Asymmetric cryptography • PKI & DSC • PKCS#7 • eSign
  • 3. Introduction • Digital Signatures are synonymous to handwritten signature or stamped seal • Mathematical technique for validating – Authenticity and integrity of a message, software or digital document • Gained legal validity as per Indian IT Act 2000
  • 4. Paper Signatures v/s Digital Signatures Properties Paper Electronic Authenticity May be forged Cannot be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation • Handwriting expert needed • Error prone • Any computer user • Error free
  • 5. PKCS & X509 Standards • PKCS 1 : – Properties and format of RSA key pairs – Algorithms for encryption/decryption, signing/verification • PKCS 7 – Cryptographic Message Syntax (CMS) Standard • PKCS 10 – Certificate Signing Request (CSR) Syntax Standard • PKCS 9 : Extended attributes for CMS and CSR – Signing Time, NONCE, Sequence, Counter Signature – DOB, Certificate Extensions, Name, Gender, Name & Address etc. • X509 version 3 and 2 : – Digital Signature Certificate(DSC), Certificate Revocation List(CRL) • PKCS 11 : Cryptographic Token Interface Standard – An API for signing and verifying data by a device that holds the key (Hardware Tokens, HSM)
  • 6. Associations in Digital Signature • Document content :: Hash (Digital fingerprint) • Hash :: Private key (Secret) • Private key :: Public key (Known to everyone) • Public key :: Certificate (Identity) • Certificate :: CA (Trusted third party) • CA :: RCAI (Root Certificate Authority of INDIA)
  • 7. Building Blocks • Cryptographic hash functions – Integrity • Asymmetric cryptography – Authentication • PKI (Public Key Infrastructure) – Identity – Non repudiation
  • 8. Cryptographic Hash Functions • Uniquely maps data of arbitrary size onto a fixed length string • Iterative one way compression • Use cases : password, hash tables, caches, finding duplicate records etc. • Uses in cryptography - HMAC & Digital Signatures • Properties – Pre-image resistance : Infeasible to generate a message from its hash – Second pre-image resistance : Given a hash, difficult to find another message with same hash – Collision resistance : No two different messages with same hash
  • 9. Symmetric Cryptography • Same key is used for encryption and decryption • Challenge – Key distribution – Key management • Non Repudiation ?
  • 10. Public Key Cryptography • Employs asymmetric(mathematically related) keys(key pairs) for encryption and decryption • RSA, DSA, ECDSA • Key used to encrypt differs from key to be used for decryption • Encryption using Public key • Signing using Private key
  • 11. Public Key Cryptography • Strength lies in computational impracticality in deducing Private key from Public key • Security lies in protecting Private key • Uses include Public key encryption and Digital Signatures • Computational complexity limits usage for short messages • Also used in hand shaking for secure exchange of symmetric keys in SSL/TLS
  • 14. Public Key Infrastructure • PKI – Public Key Infrastructure ecosystem is an intersection of: • Cryptography (Math) – Cryptographers/Researchers • Technology & Implementation – PKI System Developer • Policy & Law – PKI System & Users
  • 15. • Application • Subject Authentication • Certificate Generation • Certificate Distribution • Certificate Revocation PKI - Registration/Certification
  • 16. Certificate Authority • Certifying authority is an entity which issues Digital Certificate • It is a Trusted third party • CA’s are the important characteristics of Public Key Infrastructure (PKI) Responsibilities of CA • Verify the credentials of the person requesting for the certificate (RA’s responsibility) • Issue certificates • Revoke certificate • Generate and upload CRL • Maintain & update certificate repository • Make available Certification Practice Statement
  • 17. PKI - India • Strictly hierarchal trust path model • CCA operates Root Certificate Authority of India(self signed certificate) • Only one level of sub Certifying Authorities(max 4 certs a chain) • Necessitates issuance of end entity certificates only through its sub-CA
  • 18. Digital Signature Certificate A Public Key Certificate is an electronic document used to prove ownership of a public key. The certificate includes : • Information about its owner's identity(Subject), • Information about the key, • The Digital Signature of an entity that has verified the certificate's contents are correct(Issuer CA in PKI)
  • 19. X.509 X509 is ITU-T standard for PKI Defines formats for: • Digital Certificates – Version3 • CRL – Version 2 • Certificate Path Validation • Distinguished Name
  • 20. X.509 v3 Certificate • Version (3) • Serial Number • Signature Algorithm Identifier • Issuer Name • Validity Period • Not before • Not after • Subject Name • Subject Public Key Information • Public key algorithm • Subject public key • Optional Fields • Extensions(optional)
  • 22. X.509 v3 Certificate Class of certificate : “Aadhaar-eKYC – OTP” Mandatorily included in the Subject Varying Pseudonym guarantees unique Subject for same Aadhaar holder
  • 23.
  • 24. X.509 v3 Extension Associate additional information for subjects, public keys and certificate revocation lists • Extension type • Extension value • Criticality indicator Key Usage(Critical) : Digital Signatures, Non Repudiation CRL distribution points Certificate Policies Certification Practice Statement(CPS)
  • 25.
  • 26. PKCS#7 • Specifies a syntax for digital envelopes and digital signatures • Widely used in many applications for enveloping and authenticating messages, and for distribution of certificates and certificate revocation lists • PKCS#7 Content-Type : SignedData for Digital Signatures
  • 27. Abstract Syntax Notation 1 1. The rules of syntax for describing the contents of a message in terms of data type and content sequence or structure 2. How you actually encode each data item in a message – BER & DER(Identifier-Length-Content), XER etc. Age ::= INTEGER (0..7) User ::= SEQUENCE { name IA5String (SIZE(1..128)), age Age, address IA5String OPTIONAL, } Data Types : BOOLEAN, INTEGER, BIT STRING, OCTET STRING, NULL, REAL, ENUMERATED, GeneralizedTime, IA5String, UTF8String Constructors : SEQUENCE, SET
  • 28. PKCS#7 - SignedData Supports multiple signers/signatures
  • 30. PKCS#7 What is Digested and Signed • RAW • Hash of the message • Does not contain information on DigestAlgorithm • PKCS#7 • EncryptedDigest ASN1 structure • Contains both hash & DigestAlgorithm • AuthenticatedAttributes in case they are present
  • 31. PKCS#7 - EncryptedDigest ASN1 Definition of EncryptedDigest ASN1 Parse of Decrypted EncryptedDigest
  • 32. PKCS#7 – SigningTime • AuthenticatedAttributes DER encoded ASN1 structure is digested • This forms an association of message & signing time with the signature AuthenticatedAttributes include • SigningTime • MessageDigest and other attributes
  • 33. PKCS#7 - Signatures Types 1. Single signature – One signer and his/her signature on a document 2. Parallel signature – Multiple signer and their signature on a document 3. Counter signature – Hierarchy of signatures – UnauthenticatedAttributes contains SignerInfos for counter signer – Signature is on EncryptedDigest of previous signer – Recursive in nature Signature container may OR may not include content on which digital signature was created 1. Attached PKCS#7 signature 2. Detached PKCS#7 signature
  • 34. Without eSign Subscriber : • Application to CA for DSC (soft/hard mode) • Key generation and safe custody(iToken, Smart card) PKI : • Manual verification of credentials (VA) • Issuance & communication of DSC Limited by : • Not online • Time taken for ascertaining subscribers identity • Key management, accessibility and cost Mass adoption and integration with services
  • 35. eSign Electronic Authentication Techniques & Procedure Rules, 2015 - Legal validity to authentication & eKYC using Aadhaar eSign facilitates Digital Signatures by an Aadhaar holder – Registered & active mobile number is a prerequisite – OTP and Biometric authentication methods – eKYC treated as verified PoI and PoA (Registration)