SlideShare ist ein Scribd-Unternehmen logo
1 von 31
PRESENTED BY:
                ANKITA DAVE
                              1
SR.NO.                     TOPIC                        SLIDE NO.
  1.     WHAT IS DIGITAL SIGNATURES?                        4
  2.     WHY DIGITAL SIGNATURES?                            5
  3.     PAPER SIGNATURES VS DIGITAL SIGNATURES             6
  4.     PRIVATE KEY & PUBLIC KEY                           7
  5.     PROTECTION OF PRIVATE KEY                          8
  6.     WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)?       9
  7.     CERTIFICATION AUTHORITY (CA)                      10
  8.     HOW DOES DIGITAL SIGNATURES WORKS?                11
  9.     PROCEDURE TO OBTAIN DSC                           12

                                                                    2
SR.NO.                      TOPIC                        SLIDE NO.
  10.    STEP 1: DOWNLOADING ROOT CERTIFICATE               13
  11.    STEP 2: SELECTING A CERTIFYING AUTHORITY           18
  12.    STEP 3: VISIT THE WEBSITE OF THE CA                19
  13.    CLASS- 1 CERTIFICATES                              20
  14.    CLASS- 2 CERTIFICATES                              21
  15.    CLASS- 3 CERTIFICATES                              22
  16.    STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED      23
  17.    STEP 5: SUBMIT AN ONLINE REQUEST                   24
  18.    CONCLUSION                                         29
  19.    SOURCES OF INFORMATION                             30
                                                                     3
   As per Information Technology
    Act 2000, digital signature
    means authentication of any
    electronic record by means of
    an electronic.
   Simply, signature in digital form
                OR
    Mark to authenticate a
    document.
                                        4
   Authentification.
   Integrity.
   Low cost.
   Eliminates the use of paper.
   Faster procedures.
   Completely secure.




                                   5
PARAMETER           PAPER             DIGITAL

Authenticity      May be forged    Can not be copied
Integrity         Signature        Signature depends
                  independent of   on the contents of
                  the document     the document
Non-repudiation   a. Handwriting   a. Any computer
                     expert needed    user
                  b. Error prone   b. Error free
                                                        6
Each individual generates his own key pair.

  PRIVATE KEY              PUBLIC KEY


     Known only to              Known to
        owner                   everyone

    Used for making           Used to verify
    digital signature        digital signature

                                                 7
The private key generated is to be protected &
 kept in secret because
   Can be misused by anyone who is having
    access to your computer system.
   Is lost if computer system is formatted or
    internet explorer is changed.
 The key is secured using



                                                  8
Is an electronic means of establishing records
 when doing transactions on the Internet.
Are easily transportable and cannot be imitated.
Contains details like owner’s name & public
 key, expiration date of public, serial number &
 name of the issuer (the Certification Authority) &
 his digital signature.
It is issued so that Recipient can verify that the
 certificate is authentic.
                                                 9
SR. NO. NAMES OF CA             WEBSITES
  1.   NIC              nicca.nic.in
  2.   GNFC             www.ncodesolutions.com
  3.   SAFESCRYPT       www.safescrypt.com
  4.   TCS              www.tcs-ca.tcs.co.in
  5.   MTNL TRUSTLINE   www.mtnltrustline.com
  6.   IDRBT            www.idrbtca.org.in
  7.   E-MUDHRA         www.e-Mudhra.com




                                                 10
11
DOWNLOADING ROOT CERTIFICATE

    SELECTING A CERTIFYING AUTHORITY

VISIT THE WEBSITE OF CERTIFYING AUTHORITY

  SELECT THE TYPE OF CERTIFICATE NEEDED

       SUBMIT AN ONLINE REQUEST


                                            12
Visit the website of the Controller of Certifying
       Authorities (CCA) at www.cca.gov.in.




                                                    13
14
15
16
17
 Visit the website of the CCA at www.cca.gov.in
 to obtain a list of licensed Certifying Authorities
 in India.
 Based on information and study of the relevant
 websites, select a Certifying Authority.
  Example: TCS official website is
 www.tcs-ca.tcs.co.in.



                                                   18
A visit to the select CA website provides
  following three types of digital signature
  certificates:
CLASSES OF DSC:
 Class-1 certificates
 Class-2 certificates
 Class-3 certificates.

                                               19
 These Certificates are personal e-mail
 Certificates that allows you to secure your email
 messages. These certificates can be used to:
 1. Digitally sign email.
 2. Encrypt email.
 3. Authenticate to Web Servers.
 These certificates, however, do not facilitate
 strong authentication of the identity of the
 subscriber and hence, cannot be relied upon
 where proof of identity is required (commercial
 use).                                           20
   These Certificates are issued as Managed Digital
    Certificates to employees/ partners/ affiliates/
    customers of business and government
    organizations that are ready to assume the
    responsibility of verifying the accuracy of the
    information submitted by their employees/
    partners/ affiliates/ customers.
   These certificates issued under the TCS-CA Trust
    Network are legally valid under the Indian IT Act
    2000.
                                                    21
   These Certificates are issued to individuals,
    companies and government organizations.
   They can be used both for personal and
    commercial purposes.
   They are typically used for electronic commerce
    applications where security is a major concern.
   These Certificates issued by the TCS-CA are
    legally valid under Indian IT Act 2000.


                                                  22
We need a legally valid digital signature
certificate for an individual. The relevant
certificate is a class-3 certificate.




                                              23
The next step is to create a user account on the
TCS CA website, complete an online enrollment
form and generate a cryptographic key pair on
our computer.




                                               24
25
26
27
28
Hence, we can conclude that digital signatures:
Minimizes the risk of dealing with imposters.
Minimizes the risk of undetected message
 tampering and forgery.
Retains a high degree of information security.




                                                  29
asclonline.com/images/d/d4/Simple_Guide_to_
 Digital_Signatures.pdf
www.youdzone.com/signature.html
en.wikipedia.org/wiki/Digital_signatures
www.cca.gov.in
esolutions.net.in/digitalsignatures.html
nsdl.co.in/business/cirRec_18Mar08.doc



                                           30
Digital signature 3

Weitere ähnliche Inhalte

Was ist angesagt?

Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared ImagesIRJET Journal
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthnFIDO Alliance
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud IdentityMark Diodati
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationJustin Richer
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPSachi Sawamura
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Securityrambmohan
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gviL2MM
 
NetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2aNetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2aNetIQ
 

Was ist angesagt? (20)

Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 Presentation
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Digital signature
Digital signatureDigital signature
Digital signature
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
NetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2aNetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2a
 

Ähnlich wie Digital signature 3

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSCAbhishek Taxxinn
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signaturedeannachandler02
 

Ähnlich wie Digital signature 3 (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Advance itt
Advance ittAdvance itt
Advance itt
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSC
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 

Kürzlich hochgeladen

Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 

Kürzlich hochgeladen (20)

Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 

Digital signature 3

  • 1. PRESENTED BY: ANKITA DAVE 1
  • 2. SR.NO. TOPIC SLIDE NO. 1. WHAT IS DIGITAL SIGNATURES? 4 2. WHY DIGITAL SIGNATURES? 5 3. PAPER SIGNATURES VS DIGITAL SIGNATURES 6 4. PRIVATE KEY & PUBLIC KEY 7 5. PROTECTION OF PRIVATE KEY 8 6. WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)? 9 7. CERTIFICATION AUTHORITY (CA) 10 8. HOW DOES DIGITAL SIGNATURES WORKS? 11 9. PROCEDURE TO OBTAIN DSC 12 2
  • 3. SR.NO. TOPIC SLIDE NO. 10. STEP 1: DOWNLOADING ROOT CERTIFICATE 13 11. STEP 2: SELECTING A CERTIFYING AUTHORITY 18 12. STEP 3: VISIT THE WEBSITE OF THE CA 19 13. CLASS- 1 CERTIFICATES 20 14. CLASS- 2 CERTIFICATES 21 15. CLASS- 3 CERTIFICATES 22 16. STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED 23 17. STEP 5: SUBMIT AN ONLINE REQUEST 24 18. CONCLUSION 29 19. SOURCES OF INFORMATION 30 3
  • 4. As per Information Technology Act 2000, digital signature means authentication of any electronic record by means of an electronic.  Simply, signature in digital form OR Mark to authenticate a document. 4
  • 5. Authentification.  Integrity.  Low cost.  Eliminates the use of paper.  Faster procedures.  Completely secure. 5
  • 6. PARAMETER PAPER DIGITAL Authenticity May be forged Can not be copied Integrity Signature Signature depends independent of on the contents of the document the document Non-repudiation a. Handwriting a. Any computer expert needed user b. Error prone b. Error free 6
  • 7. Each individual generates his own key pair. PRIVATE KEY PUBLIC KEY Known only to Known to owner everyone Used for making Used to verify digital signature digital signature 7
  • 8. The private key generated is to be protected & kept in secret because  Can be misused by anyone who is having access to your computer system.  Is lost if computer system is formatted or internet explorer is changed.  The key is secured using 8
  • 9. Is an electronic means of establishing records when doing transactions on the Internet. Are easily transportable and cannot be imitated. Contains details like owner’s name & public key, expiration date of public, serial number & name of the issuer (the Certification Authority) & his digital signature. It is issued so that Recipient can verify that the certificate is authentic. 9
  • 10. SR. NO. NAMES OF CA WEBSITES 1. NIC nicca.nic.in 2. GNFC www.ncodesolutions.com 3. SAFESCRYPT www.safescrypt.com 4. TCS www.tcs-ca.tcs.co.in 5. MTNL TRUSTLINE www.mtnltrustline.com 6. IDRBT www.idrbtca.org.in 7. E-MUDHRA www.e-Mudhra.com 10
  • 11. 11
  • 12. DOWNLOADING ROOT CERTIFICATE SELECTING A CERTIFYING AUTHORITY VISIT THE WEBSITE OF CERTIFYING AUTHORITY SELECT THE TYPE OF CERTIFICATE NEEDED SUBMIT AN ONLINE REQUEST 12
  • 13. Visit the website of the Controller of Certifying Authorities (CCA) at www.cca.gov.in. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.  Visit the website of the CCA at www.cca.gov.in to obtain a list of licensed Certifying Authorities in India.  Based on information and study of the relevant websites, select a Certifying Authority. Example: TCS official website is www.tcs-ca.tcs.co.in. 18
  • 19. A visit to the select CA website provides following three types of digital signature certificates: CLASSES OF DSC:  Class-1 certificates  Class-2 certificates  Class-3 certificates. 19
  • 20.  These Certificates are personal e-mail Certificates that allows you to secure your email messages. These certificates can be used to: 1. Digitally sign email. 2. Encrypt email. 3. Authenticate to Web Servers.  These certificates, however, do not facilitate strong authentication of the identity of the subscriber and hence, cannot be relied upon where proof of identity is required (commercial use). 20
  • 21. These Certificates are issued as Managed Digital Certificates to employees/ partners/ affiliates/ customers of business and government organizations that are ready to assume the responsibility of verifying the accuracy of the information submitted by their employees/ partners/ affiliates/ customers.  These certificates issued under the TCS-CA Trust Network are legally valid under the Indian IT Act 2000. 21
  • 22. These Certificates are issued to individuals, companies and government organizations.  They can be used both for personal and commercial purposes.  They are typically used for electronic commerce applications where security is a major concern.  These Certificates issued by the TCS-CA are legally valid under Indian IT Act 2000. 22
  • 23. We need a legally valid digital signature certificate for an individual. The relevant certificate is a class-3 certificate. 23
  • 24. The next step is to create a user account on the TCS CA website, complete an online enrollment form and generate a cryptographic key pair on our computer. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. Hence, we can conclude that digital signatures: Minimizes the risk of dealing with imposters. Minimizes the risk of undetected message tampering and forgery. Retains a high degree of information security. 29