Cyber Law week 8
Cyber Law week 8
What is a digital signature?
- type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature.
How it works?
- Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key.
- Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
Smart cards
- The Private key is generated in the crypto module residing in the smart card.
- The key is kept in the memory of the smart card.
Hardware Tokens
- They are similar to smart cards in functionality as
- Key is generated inside the token.
- Key is highly secured as it doesn’t leave the token.
- Highly portable.
- Machine Independent.
Public Key Infrastructure (PKI)
- Some Trusted Agency is required which certifies the association of an individual with the key pair.
- Certifying Authority (CA)
- Public key certificate (PKC)
Certifying Authority
- Must be widely known and trusted
- Must have well defined Identification process before issuing the certificate
- Provides online access to all the certificates issued
- Provides online access to the list of certificates revoked
- Displays online the license issued by the Controller
- Displays online approved Certification Practice Statement (CPS)
- Must adhere to IT Act/Rules/Regulations and Guidelines
Role of controller
- Controller of Certifying Authorities as the “Root” Authority certifies the technologies, infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
Comments
Post a Comment