Digital Signature
Digital Signature
1
Agenda
Dimensions of PKI
Paper World Vs Electronic World
Why Digital Signature?
What is Digital Certificate?
What is Digital Signature?
Certificate Classes
How to get DSC?
Risks and Precautions with DS
Legal Aspects of DSC
Present Scenario in India
2
Dimensions of PKI
Technology Perspective
Paper Records v/s Electronic Records
Paper Records v/s Electronic
Records
Paper Record Electronic Record
Document Form Physical Digital
7
Paper Records v/s Electronic
Records
Paper Record Electronic Record
Insecure Channel
Threats: Packet Sniffing
telnet foo.bar.org
username: don
password: ***
m-y-p-a-s-s-w-o-r-d d-o-n
Breach of Confidentiality
Threats: Data Alteration
Customer Bank
Breach of Integrity
Threats: Spoofing
I’m Veeru
Gabbar Send Me all Corporate
Correspondence
with ‘abc’.
Jai
Breach of Authenticity
Veeru
Why Digital Signature?
Why Digital Signatures?
•To provide Authenticity, Integrity
and Non-repudiation to electronic
documents
•To use the Internet as the safe and
secure medium for e-Commerce and
e-Governance
Mathematical Perspective
Major Components of Digital Signature
17 17
Hash - Example
Hi Jai, Message Hi Jai,
I will be in the park at I will be in the park at
3 pm 8 pm
Veeru Veeru
Hash Algorithm
Message Digest
cfa2ce53017030315fde705b9382d9f4 d4216ytf6b9385fe502b165dfe8cec17
cfa2ce53017030315fde705b9382d9f4
X
Hi Jai,
I will be in the park at
3 pm
Veeru
19
MD5 and SHA
Message
Message Digest
cfa2ce53017030315f 1f695127f210144329ef
2g5487f56r4etert654tr
98e6da4f4adb92c5f18
de705b9382d9f4 c5d5e8d5ex5gttahy55e
2
Public Key
KnJGdDzGSIHDZuOE
X Private Key
iWLI+4jxMqmqVfAKr2E
X Computationally Infeasible
21
RSA Key pair
(including Algorithm identifier) [2048 bit]
Private Key
3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83
463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc
b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3
a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f
8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f
5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95
9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3
7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb
5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742
859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e
a146 2840 8102 0301 0001
Public Key
3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d
e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653
8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68
2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055
eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd
e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb
6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca
da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559
b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90
bcff 9634 04de 45de af46 2240 8410 02f1 0001
Matrix of Knowledge of Keys
This is an example of
how to create a
message digest and
how to digitally sign a Message
document using Hash
Digest
Public Key
cryptography
Digital Signing – Step 2
This is an example of
how to create a
message digest and
how to digitally sign a
Digital
Append document using
Signature
Public Key
cryptography
Digital
Signature
Digital Signature verification
This is an example of
how to create a Message
Hash Digest
message digest and
how to digitally sign a
document using
Public Key
cryptography
Digital
Decrypt with Message
Signature public key Digest
Signature Creation & Verification
Hashing + Encryption = Signature Creation
Transmitted Message
Hash Function
Decrypt
Message Signature Hash Function
Digest
Message Expected
Digest Digest
Encrypt
Sender
If these are the same,
Alice then the message
has not changed
Veeru
Hashing + Decryption = Signature Verification
Digital Signatures
(Examples)
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents
Veeru Info:
Name: Veeru
Department: AMD
Sign Digital
Certificate Info:
Serial No: 93939 Certificate
Exp Date:
– Class – 3 Certificate
• Issued to Individuals and Organizations
• Assurance Level: Highest level of Assurance; Proves
existence of name of the organization, and assures
applicant’s identity authorized to act on behalf of the
organization.
• Suggested Usage: Signing certificate may also be used for
digital signing for discharging his/her duties as per official
designation and also encryption certificate may also be
used for encryption requirement as per his/her official
capacity
Certificate Extensions
Certificate Extension Description
.CER Contains only Public Key
.CRT Contains only Public Key
.DER Contains only Public Key
.P12 Contains Public and Private Key
Encrypted Message
A Encrypt Decrypt B
Eavesdropper
Risks & Precautions in PKI Security
Private key protection
• The Private key generated
is to be protected and kept
secret. The responsibility
of the secrecy of the key
lies with the owner.
Licensed CA (Eg. NIC) Licensed CA (Eg. IDRBT) Licensed CA (Eg. nCode) ...
3 E-Customs (G2B)
4 E-Passport (G2C) - Presently in India, the Ministry of External Affairs has
started issuing e-Passports in Karnataka state with the fingerprints
and the digital photo of applicant
5 E-Governance Bhoomi (G2C)
a PKI enabled registration and Land Records Services offered by
Govt. of Karnataka to the people. All the land records and
certificates issued are digitally signed by the respective officer
6 E-Payment (B2B) - In India, currently between banks fund transfers are done
using PKI enabled applications whereas between customers and
vendors such as online shopping vendor the payment is done
through SSL thereby requiring the vendor to hold DSC )
PKI enabled Applications