Digital Signatures - CISO
Digital Signatures - CISO
Key Infrastructure
(Digital Signatures, PKI, TLS)
1
Agenda
✓ What & Why: Digital Signature?
✓ What is Digital Signature Certificate?
✓ Achieving Confidentiality
✓ Certifying Authority & Trust Model
✓ Certificate Issuance, Types, Classes
✓ Certificate Life Cycle Management and Validation Methods
✓ Risks and Precautions with DS
✓ Policy and Legal Aspects of PKI
✓ e-Sign – An Instant & Online way of Digital Signing in India
✓ PKI Applications in India
2
Understanding Signature
• Hand-written Signature – Definition & Purpose
– A person’s name written in a distinctive way as a
form of identification in authorizing a cheque or
document
– A distinctive pattern, product, or characteristic by
which someone or something can be identified
Characteristics of Hand Signature
• A Hand Signature on a document is
– a unique pattern dependant on some secret known only to
the signer and
– Independent of the content of the message being signed
Attacks on Hand-written Signatures
• Attacks on Integrity
– Content Alteration / Corruption !
• Attacks on Identity
– Impersonation
– How is Identity verified?
• Authentication – Process of verifying who somebody is
against his claim
– Identity is established / proved through Authentication!
Attacks on Integrity
Attacks on Integrity - 2
Electronic World
Attacks on Integrity
Customer Bank
Breach of Integrity
Attacks on Identity
I’m Veeru
Gabbar Send Me all Corporate
Correspondence
with ‘abc’.
Jai
Breach of Authenticity
Veeru
Basic Elements of Trust
• Privacy (Confidentiality): Ensuring that only
authorized persons read the Data/Message/Document
• Authenticity: Ensuring that Data/Message/Document
originated from the claimed signer / sender
• Integrity : Ensuring that Data/Message/Document are
unaltered by any unauthorized person
• Non-Repudiation: Ensuring that one cannot deny
their signature or origination of a message
Digital Signatures
What is a Digital Signature ?
• A Digital signature of a message is a number (fingerprint)
dependent on
– a secret known only to the signer and
– the content of the message being signed
X15
Computationally Infeasible
What is a key pair?
Private Key
3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83
463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc
b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3
a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f
8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f
5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95
9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3
7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb
5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742
859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e
a146 2840 8102 0301 0001
Public Key
3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d
e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653
8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68
2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055
eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd
e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb
6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca
da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559
b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90
bcff 9634 04de 45de af46 2240 8410 02f1 0001
Digital Signing – Step 1
This is an example of
how to create a
message digest and
how to digitally sign a Message
document using Hash
Digest
Public Key
cryptography
Hash Function
19 19
Hash - Example
Hi Jai, Message Hi Jai,
I will be in the park at I will be in the park at
3 pm 3 pm.
Veeru Veeru
Hash Algorithm
Message Digest
B5EA1EC376E61DB2680D0312FC26D3773F384E43 86D19C25294FB0D3E4CF8A026823439064598009
X
Hi Jai,
I will be in the park at
3 pm
Veeru
21
MD5 and SHA
Message
Message Digest
cfa2ce53017030315f 1f695127f210144329ef
2g5487f56r4etert654tr
98e6da4f4adb92c5f18
de705b9382d9f4 c5d5e8d5ex5gttahy55e
2
This is an example of
how to create a
message digest and
how to digitally sign a
Digital
Append document using
Signature
Public Key
cryptography
Digital
Signature
Digital Signing Process
Digital Signature Verification
This is an example of
how to create a Message
Hash Digest
message digest and
how to digitally sign a
document using
Public Key
cryptography
Digital
Decrypt with Message
Signature public key Digest
Digital Signature Verification
Digital Signatures - Examples
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
• These are digital signatures of same person on different documents
Certificate Info:
Serial No: 93 15 H0 Sign
Exp Date: dd mm yy
Responsibilities of CA
• Verify the credentials of the person requesting for the certificate (RA’s
responsibility)
• Issue certificates
• Revoke certificate
Licensed CA (Eg. NIC) Licensed CA (Eg. IDRBT) Licensed CA (Eg. nCode) ...
Issue Crypto
Token
Other
Identity
Make Online Information
Payment
X.509 v3 Cert
Crypto Tokens
• Contain a Cryptographic co-processor
with a USB interface
– Key is generated inside the token.
– Key is highly secured as it doesn’t leave
the token
– Highly portable and Machine-
independent
– FIPS 140-2 compliant; Tamper-resistant;
Certificate Classes
Classes of Certificates
• Classes define the level of assurance for a
Digital Certificate
• 3 Classes of Certificates
– Class – 1 Certificate
• Issued to Individuals
• Assurance Level: Certificate will confirm User’s name
and Email address
• Suggested Usage: Signing certificate primarily be used
for signing personal emails and encryption certificate is
to be used for encrypting digital emails and
SSL certificate to establish secure communication
through SSL
Classes of Certificates
– Class – 2 Certificate
• Issued for both business personnel and private
individuals use
• Assurance Level: Conforms the details submitted in
the form including photograph and documentary
proof
• Suggested Usage: Signing certificate may also be used
for digital signing, code signing, authentication for VPN
client, Web form signing, user authentication, Smart Card
Logon, Single sign-on and signing involved in e-
procurement / e-governance applications, in addition to
Class-I usage
Classes of Certificates
– Class – 3 Certificate
• Issued to Individuals and Organizations
• Assurance Level: Highest level of Assurance; Proves
existence of name of the organization, and assures
applicant’s identity authorized to act on behalf of the
organization.
• Suggested Usage: Signing certificate may also be used for
digital signing for discharging his/her duties as per official
designation and encryption certificate to be used for
encryption requirement as per his/her official capacity
Types of Certificates
Types of Certificates
• Types define the purpose for which a Digital
Certificate is issued
• Signing Certificate (DSC)
– Issued to a person for signing of electronic
documents
• Encryption Certificate
– Issued to a person for the purpose of Encryption;
• SSL Certificate
– Issued to a Internet domain name (Web Servers,
Email Servers etc…)
Achieving Secrecy
Achieving Secrecy through Asymmetric
Key Encryption
Encrypted Message
A Encrypt Decrypt B
Eavesdropper
General Conventions
• Encryption – Public Key of the Receiver
• Decryption – Private Key of the Receiver
Achieving PAIN !
• How to achieve Privacy, Authenticity, Integrity
and Non-repudiation all together in a
transaction
Signcryption
• Why do you need Signcryption ?
– The intended receiver alone should know the
contents of the message
• Secrecy / Confidentiality / Privacy
– The receiver should be sure that
• The message has come from the claimed sender only
– Authentication
• The message has not been tampered
– Integrity
• Signer has used a valid and trustable certificate
– Non-Repudiation
Certificate Extensions
File Formats with Extensions Description
.CER Contains only Public Key
.CRT Contains only Public Key
.DER Contains only Public Key
.P12 Contains Public and Private Key
3 e-Customs (G2B)
Shopping.co
m
With TLS
• Servers use TLS (Transport Layer Security)
certificates,
– A certificate issued to a machine/server so as
to establish a secure connection between the
server and a browser using which we access
the server.
– Now all the information that is exchanged is
in encrypted form and won’t make sense to
anyone who tries to tap the information.
With TLS
Shopping.co
m
TLS 1.3
▪ Client says Hello to Server, along with a keyshare, that it had
generated
▪ Server receives the keyshare from the client, generates its own
keyshare, and mixes it to derive the secret key.
▪ Server then sends its keyshare, certificate (that contains the
public key of the server) and digitally signs this response.
Additionally it also encrypts the certificate and the signed
response
▪ Client receives it, takes the keyshare and mixes with its own
keyshare to derive the secret key and verifies the signature and
certificate
▪ So both of them have arrived at the shared secret and they can
communicate securely
• Courtesy: Filippo Valsorda, CloudFlare
Sample Certificate
TLS Certification Issuance