0% found this document useful (0 votes)
268 views28 pages

IT Act 2000: Electronic Records Security

The Information Technology Act, 2000 in India provides a framework for the authentication and security of electronic records and signatures, primarily through Sections 3, 3A, 14, 15, and 16. It establishes legal equivalence between digital and handwritten signatures, outlines technical requirements for secure electronic signatures, and empowers the Central Government to set security standards. Additionally, the Act includes provisions for the appointment and functions of the Controller of Certifying Authorities, licensing requirements for certifying authorities, and judicial support for the validity of electronic signatures.

Uploaded by

MAHI JAIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
268 views28 pages

IT Act 2000: Electronic Records Security

The Information Technology Act, 2000 in India provides a framework for the authentication and security of electronic records and signatures, primarily through Sections 3, 3A, 14, 15, and 16. It establishes legal equivalence between digital and handwritten signatures, outlines technical requirements for secure electronic signatures, and empowers the Central Government to set security standards. Additionally, the Act includes provisions for the appointment and functions of the Controller of Certifying Authorities, licensing requirements for certifying authorities, and judicial support for the validity of electronic signatures.

Uploaded by

MAHI JAIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Authentication of Electronic Records and Security

Provisions under the Information Technology Act


The Information Technology Act, 2000 establishes a comprehensive framework for electronic
transactions in India, providing specific provisions for authentication, security, and verification of
electronic records and signatures. The following sections form the cornerstone of electronic
authentication and security under Indian IT law:

1. Authentication of Electronic Records - Section 3


Section 3 of the IT Act provides the foundational mechanism for authenticating electronic
records through digital signatures. The section establishes a robust cryptographic framework
that ensures the integrity and authenticity of electronic documents. [1] [2] [3]

Legal Framework and Requirements


Section 3(1) states that any subscriber may authenticate an electronic record by affixing his
digital signature, subject to the provisions of this section. This provision grants legal authority to
individuals to digitally sign documents, making them legally equivalent to handwritten
signatures. [2] [1]
Section 3(2) mandates that authentication of electronic records shall be effected by the use of
asymmetric crypto system and hash function which envelop and transform the initial electronic
record into another electronic record. This technical requirement ensures that digital signatures
meet international cryptographic standards. [3] [2]

Technical Components
The authentication process employs several critical cryptographic elements:
Hash Function: The Act defines this as an algorithm that maps or translates one sequence of
bits into another, generally smaller set known as "hash result". The hash function ensures that: [2]
[3]

An electronic record yields the same hash result every time the algorithm is executed with
the same input
It is computationally infeasible to derive the original electronic record from the hash result
Two different electronic records cannot produce the same hash result using the algorithm [2]
Asymmetric Cryptography: This system utilizes a pair of mathematically related keys - a
private key (kept secret by the subscriber) and a public key (shared publicly). The private key
encrypts data to create the digital signature, while the corresponding public key decrypts and
verifies it. [4] [5]
Section 3(3) establishes that any person can verify the electronic record by using the public key
of the subscriber. This provision enables universal verification of digital signatures without
compromising the security of the private key. [3] [2]
Section 3(4) confirms that the private key and public key are unique to the subscriber and
constitute a functioning key pair. This uniqueness ensures non-repudiation and prevents
unauthorized use of digital signatures. [3]

Verification Process
The verification mechanism works through the following steps: [4]
1. The verifier calculates a hash of the same data (file, message, etc.)
2. Decrypts the digital signature using the sender's public key
3. Compares the two hash values - if they match, the signature is valid

2. Electronic Signature - Section 3A


Section 3A, introduced by the 2008 Amendment Act, expanded the authentication framework
beyond traditional digital signatures to include broader electronic authentication techniques. [6]
[7] [8] [9]

Scope and Flexibility


Section 3A(1) provides that notwithstanding Section 3, a subscriber may authenticate any
electronic record by such electronic signature or electronic authentication technique which:
Is considered reliable; and
May be specified in the Second Schedule [10] [6]
This provision makes the IT Act technology-neutral, recognizing both digital signatures based on
cryptography and electronic signatures using other technologies. [11]

Reliability Criteria
Section 3A(2) establishes comprehensive reliability standards. An electronic signature or
electronic authentication technique is considered reliable if: [6] [10]
(a) Unique Linkage: The signature creation data or authentication data are linked within their
context to the signatory or authenticator and to no other person [6]
(b) Exclusive Control: The signature creation data or authentication data were, at the time of
signing, under the control of the signatory or authenticator and no other person [6]
(c) Signature Detectability: Any alteration to the electronic signature made after affixing is
detectable [6]
(d) Information Detectability: Any alteration to the information made after its authentication by
electronic signature is detectable [6]
(e) Additional Conditions: It fulfills such other conditions as may be prescribed by the Central
Government [6]

Government Authority
Section 3A(3) empowers the Central Government to prescribe procedures for ascertaining
whether an electronic signature belongs to the purported person. Section 3A(4) allows the
government to add or omit electronic signature techniques from the Second Schedule, provided
they meet reliability standards. [10]

Second Schedule Techniques


The Second Schedule currently specifies e-authentication techniques including: [12] [13]
Aadhaar e-KYC services
Other e-KYC services (added in 2019) [14]
Trusted third-party services for key pair generation and storage [12]
Recent amendments have expanded authentication options beyond Aadhaar-based systems,
allowing for diverse e-KYC methods while maintaining security standards. [15] [14]

3. Secured Electronic Record - Section 14


Section 14 defines when an electronic record achieves secure status, providing legal certainty
about the integrity of electronic documents. [16] [17] [18]

Security Determination
The section states that "Where any security procedure has been applied to an electronic
record at a specific point of time, then such record shall be deemed to be a secure electronic
record from such point of time to the time of verification". [18] [19] [16]
This provision establishes a temporal framework for security, ensuring that once security
procedures are applied, the record maintains its secure status throughout the verification
process.

Practical Applications
The secure electronic record provision ensures that: [20]
Electronic records are protected from the time of creation until verification
Security procedures provide legal weight to electronic documents
Courts can presume the integrity of secure electronic records
Legal Implications
Under Section 85B of the Indian Evidence Act, courts shall presume that secure electronic
records have not been altered up to the point in time to which the secure status relates. This
creates a strong legal presumption in favor of properly secured electronic records. [21]

4. Secured Electronic Signature - Section 15


Section 15, as amended in 2009, defines the criteria for secure electronic signatures,
establishing higher security standards than basic electronic signatures. [9] [22]

Security Requirements
Section 15 states that an electronic signature shall be deemed to be a secure electronic
signature if: [22] [23]
(i) Exclusive Control: The signature creation data, at the time of affixing signature, was under
the exclusive control of the signatory and no other person [22]
(ii) Prescribed Storage: The signature creation data was stored and affixed in such exclusive
manner as may be prescribed [22]
The Explanation clarifies that in case of digital signature, "signature creation data" means the
private key of the subscriber. [22]

Enhanced Legal Status


Secure electronic signatures enjoy stronger legal presumptions under the Indian Evidence Act:
[24]

Section 67A: If a secure electronic signature is used, it will be presumed that the signature
belonged to the signer and not to any other person [24]
Section 85B(2): Courts shall presume that secure electronic signatures were affixed by the
subscriber with the intention of signing or approving the electronic record [24]
These presumptions significantly reduce the burden of proof for parties relying on secure
electronic signatures in legal proceedings.

5. Security Procedures - Section 16


Section 16 empowers the Central Government to establish comprehensive security standards for
electronic records and signatures. [25] [26]

Government Authority
Section 16 provides that the Central Government may prescribe security procedures and
practices for the purposes of Sections 14 and 15. This delegation of authority ensures that
security standards can be updated to address evolving technological and security challenges.
[26] [25]
Considerations for Security Procedures
The Proviso to Section 16 mandates that in prescribing security procedures and practices, the
Central Government shall have regard to: [25] [9]
Commercial circumstances
Nature of transactions
Such other related factors as it may consider appropriate
This flexible approach allows security requirements to be tailored to different types of
transactions and business environments.

Practical Implementation
The security procedures prescribed under this section ensure: [27]
Protection of electronic records and signatures from unauthorized access
Maintenance of integrity throughout the transaction lifecycle
Adaptability to changing technological landscapes
Balance between security and commercial practicality

Judicial Interpretation and Case Law


Indian courts have consistently upheld the validity of electronic signatures and records under
the IT Act framework:

Key Judicial Pronouncements


State of Maharashtra v. Dr. Praful B. Desai (2003): The Supreme Court upheld the validity of
digital signatures and electronic records under the IT Act, emphasizing their importance in
facilitating electronic transactions. [21]
Trimex International FZE Ltd. vs. Vedanta Aluminum Ltd. (2010): The Delhi High Court held
that digital signatures, when used in compliance with IT Act provisions, carry the same legal
validity as handwritten signatures. [21]
Anvar P.V. v. P.K. Basheer (2014): The Supreme Court emphasized that safeguards under
Section 65B of the Indian Evidence Act ensure the source and authenticity of electronic records
are reliable. [28] [21]
Arjun Panditrao Khotkar v. Kailash Kushanrao (2020): The Supreme Court clarified that
electronic records can be proven in court by the device owner entering the witness box to
establish ownership and control. [29] [28]
Evidentiary Presumptions
The Indian Evidence Act provides several presumptions favoring electronic signatures: [24] [21]
Section 85A: Courts shall presume electronic signatures in electronic agreements are valid
Section 85B: Courts shall presume secure electronic records have not been altered and
secure electronic signatures were affixed with intent to sign
Section 85C: Information in Electronic Signature Certificates is presumed correct
Section 90A: Electronic records over five years old with electronic signatures are presumed
authentic
These provisions create a strong legal framework supporting the enforceability of electronic
transactions and signatures in Indian courts, providing parties with confidence in conducting
business electronically while maintaining appropriate security standards.
The comprehensive framework established by Sections 3, 3A, 14, 15, and 16 of the IT Act,
supported by judicial interpretation and evidentiary presumptions, ensures that electronic
authentication and security meet the highest legal and technical standards required for modern
digital transactions.

Controller of Certifying Authorities, Licensing


Framework, and Digital Certificates under IT Act
5. Controller of Certifying Authorities (CCA) - Sections 17, 18, 19, 27, 28, 29, 68

Section 17 - Appointment of Controller and Other Officers


Central Government may appoint a Controller of Certifying Authorities by notification in
Official Gazette [77] [78]
May also appoint Deputy Controllers, Assistant Controllers and other officers as deemed
fit [79] [77]
Controller functions under general control and directions of Central Government [77]
Deputy and Assistant Controllers work under general superintendence and control of the
Controller [77]
Head Office and Branch Offices at places specified by Central Government [77]
There shall be a seal of the Office of the Controller [77]
Qualifications, experience and terms of service to be prescribed by Central
Government [77]
Section 18 - Functions of Controller
The Controller may perform the following 14 key functions: [80] [81] [82]
Exercising supervision over activities of Certifying Authorities [81] [82]
Certifying public keys of the Certifying Authorities [82] [81]
Laying down standards to be maintained by Certifying Authorities [81] [82]
Specifying qualifications and experience for employees of Certifying Authorities [82] [81]
Specifying conditions for conducting business by Certifying Authorities [81] [82]
Specifying contents of written, printed or visual materials and advertisements for electronic
signature certificates [81]
Specifying form and content of electronic signature certificates and keys [81]
Specifying form and manner for maintaining accounts by Certifying Authorities [82] [81]
Specifying terms and conditions for appointment of auditors and their remuneration [82] [81]
Facilitating establishment of electronic systems by Certifying Authorities [82] [81]
Specifying manner of dealings between Certifying Authorities and subscribers [81] [82]
Resolving conflicts of interest between Certifying Authorities and subscribers [82] [81]
Laying down duties of Certifying Authorities [81] [82]
Maintaining database containing disclosure records of every Certifying Authority
accessible to public [82] [81]

Section 19 - Recognition of Foreign Certifying Authorities


Controller may recognize foreign Certifying Authorities with prior approval of Central
Government by notification in Official Gazette [83] [84] [85]
Subject to conditions and restrictions as specified by regulations [85] [83]
Electronic signature certificates issued by recognized foreign CAs shall be valid for
purposes of IT Act [83] [85]
Controller may revoke recognition for contravention of conditions, with reasons recorded in
writing [85] [83]
Two regulatory frameworks exist for recognition:
For foreign CAs operating under regulatory authority [86]
For foreign CAs not operating under regulatory authority [87] [86]
Deemed recognition available for CAs authorized by recognized regulatory authorities [86]
Memorandums of Understanding to be signed between CCA and foreign regulatory
authorities [86]
Section 27 - Power to Delegate
Controller may authorize in writing Deputy Controller, Assistant Controller or any officer to
exercise any powers of the Controller under Chapter VI [88] [78] [79]
Enables operational efficiency and regional implementation of Controller's functions [89]
Ensures effective administration across different geographical locations [89]

Section 28 - Power to Investigate Contraventions


Controller or authorized officer shall investigate any contravention of IT Act provisions,
rules or regulations [90] [91]
Controller exercises same powers as conferred on Income-tax authorities under Chapter
XIII of Income Tax Act, 1961 [91] [90]
Powers include:
Entering and searching premises [92]
Breaking open doors/cupboards if keys unavailable [92]
Seizing documents/records for investigation [92]
Compelling production of documents [92]
Enforcing attendance of any person [92]
No guidelines/rules framed for implementation creates procedural concerns [92]

Section 29 - Access to Computers and Data


Controller or authorized person may have access to computer systems, apparatus, data if
reasonable cause to suspect contravention [93]
May search or cause search for obtaining information or data [93]
May direct any person in charge of computer system to provide reasonable technical
assistance [93]
Covers contraventions of Chapter VI provisions (regulation of Certifying Authorities) [94] [93]

Section 68 - Power of Controller to Give Directions


Controller may direct Certifying Authority or employees to take measures or cease
activities to ensure compliance [95] [96]
Penalty for non-compliance: imprisonment up to 2 years or fine up to Rs. 1 lakh or
both [96] [95]
Intentional or knowing failure to comply with Controller's order constitutes offence [95] [96]
Ensures regulatory compliance and maintains standards in digital certification
ecosystem [96]
6. Licence for Certifying Authorities - Sections 21-34 with Rules

Licensing Framework (Sections 21-26)


Section 21 - Licence to Issue Electronic Signature Certificates
Any person may apply for licence to issue electronic signature certificates [97]
Must fulfill requirements regarding qualification, expertise, manpower, financial
resources and infrastructure [97]
Licence not transferable or heritable [97]
Application must be made in prescribed form with prescribed fee [98]
Section 22 - Application for Licence
Application in prescribed form with required documents [98]
Fee payment as prescribed by Central Government [98]
Must include business plan, technical infrastructure details [98]
Section 24 - Procedure for Grant or Rejection
Controller may grant or reject licence after considering application and making
enquiries [98]
Reasonable opportunity to be given before rejection [98]
Decision with reasons recorded in writing [98]
Section 25 - Suspension of Licence
Controller may suspend licence if Certifying Authority:
Made incorrect/false statements in application [99]
Failed to comply with licensing conditions [99]
Failed to maintain prescribed standards [99]
Contravened IT Act provisions [99]
No issuance of electronic signature certificates during suspension [99]

Information Technology (Certifying Authority) Rules, 2000


Key Provisions of the Rules: [100] [101]
Rule 8 - Eligibility Criteria: Specifies qualifications, experience and infrastructure
requirements [98]
Rule 10 - Application Form: Prescribed form for licence application appears in Schedule
I [98]
Rule 23 - Certificate Issuance Guidelines: Detailed procedures for issuing Digital Signature
Certificates [102]
Certification Practice Statement (CPS) mandatory with application [101] [98]
Technical audit by CCA-empanelled auditor required [98]
Bank Guarantee and Undertaking submission mandatory [98]
Maximum fee of Rs. 25,000 for application [103]

Duties and Obligations (Sections 30-34)


Section 30 - Certifying Authority Procedures
Must follow prescribed procedures for certificate issuance [104]
Compliance with technical and security standards [104]
Section 32 - Display of Licence
Every Certifying Authority must display licence at conspicuous place of business
premises [79]
Section 33 - Surrender of Licence
Immediate surrender of licence upon suspension or revocation [79]
Section 34 - Disclosure
Must disclose electronic signature certificate and other prescribed information [105]
Disclosure in manner specified by regulations [105]

7. Electronic Signature Certificate (ESC) - Section 35

Application Process
Any person may apply to Certifying Authority for Electronic Signature Certificate in
prescribed form [103]
Application accompanied by fee not exceeding Rs. 25,000 as prescribed by Central
Government [103]
Different fees may be prescribed for different classes of applicants [103]
Must include Certification Practice Statement or statement with prescribed particulars [103]

Grant or Rejection
Certifying Authority may grant or reject application after considering CPS and making
enquiries [103]
Reasons to be recorded in writing for rejection [103]
Reasonable opportunity must be given before rejection [103]
Decision based on compliance verification and applicant credentials [103]
Legal Framework
Broader concept than Digital Signature Certificate post-2009 amendment [106]
Includes multiple authentication techniques beyond traditional cryptographic
methods [106]
Must meet reliability criteria under Section 3A [106]
Technology-neutral approach allowing various electronic authentication methods [106]

8. Digital Signature Certificate (DSC) - Sections 35-39

Section 35 - Certificate Issuance


Same application process as Electronic Signature Certificate [107]
Certifying Authority must ensure applicant holds private key corresponding to public
key [107]
No interim certificates issued [102]
Certificate generated upon valid request for new or renewal [102]

Section 36 - Representations Upon Issuance


Certifying Authority must certify that: [108]
Complied with IT Act provisions, rules and regulations [108]
Published Digital Signature Certificate or made available to relying persons [108]
Subscriber holds private key corresponding to public key listed [108]
Subscriber holds private key capable of creating digital signature [108]
Public key can verify digital signature affixed by subscriber's private key [108]
Public and private keys constitute functioning key pair [108]
Information in certificate is accurate [108]
No knowledge of material facts that would adversely affect reliability [108]

Section 37 - Suspension of Certificate


Certifying Authority may suspend certificate if:
Subscriber requests suspension [109]
Suspension would be in public interest [109]
Maximum suspension period: 15 days unless opportunity given to present case [110]
Section 38 - Revocation of Certificate
Certificate may be revoked if: [109]
Subscriber requests revocation [109]
Subscriber dies or becomes insolvent [109]
Subscriber (firm/company) is dissolved or wound up [109]
Material fact represented was concealed or false [109]
Requirements for issuance were not satisfied [109]
CA's private key or security system was compromised [109]

Section 39 - Notice of Suspension or Revocation


Immediate notice to subscriber and persons likely to rely on certificate [109]
Publication in repository or database [109]
Effective from time of publication unless otherwise specified [109]

Types of Digital Signature Certificates


Individual DSC: [111] [109]
Only Sign - for signing documents only
Encrypt - for encrypting documents
Sign and Encrypt - for both signing and encryption
Organization DSC: [112]
For companies and organizations
Different validation levels available
Server Certificates: [111]
For server identification
SSL/TLS communications

Validity and Legal Presumptions


Maximum validity: 3 years [110]
Section 85B presumptions: Secure electronic records not altered, secure electronic
signatures affixed with intent [109]
Section 85C presumption: Information in Electronic Signature Certificate is correct [109]
Section 73A: Court may order verification using public key [109]
Strong legal framework supporting enforceability in courts with multiple evidentiary
presumptions [109]
This comprehensive framework ensures robust regulation of digital authentication infrastructure
in India through the Controller of Certifying Authorities' supervisory role, structured licensing of
Certifying Authorities, and standardized procedures for Electronic Signature and Digital
Signature Certificate issuance and management.

Cryptography, Types, Advantages/Disadvantages


and Public Key Infrastructure
10. Cryptography: Definition, Types, and Advantages/Disadvantages

Definition of Cryptography
Cryptography is the science of secure communication techniques that transform readable
information (plaintext) into unreadable format (ciphertext) using mathematical
algorithms [149] [150]
Primary purpose is to protect data confidentiality, integrity, authenticity, and non-
repudiation during transmission and storage [151] [152]
Core mechanism involves encryption (converting plaintext to ciphertext) and decryption
(converting ciphertext back to plaintext) [153]
Based on mathematical algorithms called cryptographic algorithms that use keys to
control the encryption and decryption process [149]

Types of Cryptography

A. Symmetric Key Cryptography


Definition and Mechanism: [154] [155]
Single key used for both encryption and decryption processes
Same key must be shared between sender and receiver
Faster processing compared to asymmetric encryption
Encryption formula: P = D(K, E(K, P)) where K is shared key, P is plaintext [154]
Key Characteristics: [156] [154]
Key length: Typically 128 or 256 bits
Speed: Very fast encryption and decryption
Scalability: Difficult to scale in large networks
Key distribution: Requires secure channel for key sharing
Popular Algorithms: [157] [158]
AES (Advanced Encryption Standard): Most widely used, supports 128, 192, 256-bit keys
DES (Data Encryption Standard): 64-bit encryption, now considered obsolete
3DES (Triple DES): Enhanced version of DES with three encryption rounds
Blowfish: Variable key length from 32 to 448 bits
Applications: [152]
File encryption for data storage security
VPN connections for secure network communication
Database encryption for protecting stored information
Secure messaging applications

B. Asymmetric Key Cryptography (Public Key Cryptography)


Definition and Mechanism: [155] [159]
Two mathematically related keys: public key (shared openly) and private key (kept secret)
Public key used for encryption, private key used for decryption
Eliminates key distribution problem of symmetric encryption
Mathematical formula: P = D(Kd, E(Ke, P)) where Ke is encryption key, Kd is decryption
key [154]
Key Characteristics: [156] [154]
Key length: Minimum 1024 bits, typically 2048 bits or higher
Speed: Slower than symmetric encryption
Security: Higher security due to separate keys
Non-repudiation: Supports digital signatures
Popular Algorithms: [158] [157]
RSA (Rivest-Shamir-Adleman): Most widely used for encryption and digital signatures
ECC (Elliptic Curve Cryptography): Provides same security with smaller key sizes
Diffie-Hellman: Used for secure key exchange
DSA (Digital Signature Algorithm): Primarily for digital signatures
Applications: [159] [152]
Digital signatures for document authentication
SSL/TLS protocols for secure web communications
Email encryption (PGP/GPG systems)
Key exchange for establishing symmetric keys
C. Hash Functions
Definition and Properties: [160] [161]
One-way mathematical functions that convert input of any length to fixed-length output
Deterministic: Same input always produces same hash
Avalanche effect: Small input change causes dramatic output change
Irreversible: Computationally infeasible to derive input from hash
Key Properties: [162] [160]
Pre-image resistance: Cannot determine original input from hash
Second pre-image resistance: Cannot find different input producing same hash
Collision resistance: Extremely difficult to find two inputs with same hash
Fast computation: Efficient processing for large datasets
Popular Hash Algorithms: [163]
SHA-256: 256-bit output, widely used in blockchain and digital signatures
SHA-1: 160-bit output, now deprecated due to vulnerabilities
MD5: 128-bit output, fast but cryptographically broken
SHA-3: Latest NIST standard with improved security
Applications: [161] [160]
Digital signatures: Creating message digests for signing
Data integrity verification: Checksums for file verification
Password storage: Hashing passwords before database storage
Blockchain technology: Linking blocks and mining processes

Advantages of Cryptography
Security Benefits: [151] [152]
Confidentiality: Ensures only authorized parties can access information
Integrity: Protects data from unauthorized modification during transmission
Authentication: Verifies identity of communicating parties
Non-repudiation: Prevents denial of communication or transactions
Practical Applications: [152] [153]
Secure communications: Protects email, messaging, and voice communications
E-commerce protection: Secures online transactions and payment information
Regulatory compliance: Helps meet GDPR, HIPAA, PCI-DSS requirements
Digital signatures: Provides legal validity to electronic documents
Operational Benefits: [151]
Access control: Restricts data access to authorized users only
Secure transactions: Enables safe digital banking and commerce
Data verification: Ensures message/file integrity through hashing
Trust establishment: Creates foundation for secure digital relationships

Disadvantages of Cryptography
Technical Limitations: [153] [151]
Performance overhead: Encryption/decryption processes consume computational
resources
Speed reduction: Can significantly slow data transmission, especially with strong encryption
Complexity: Requires high technical expertise for proper implementation
Power consumption: Cryptographic operations are computationally intensive
Management Challenges: [164] [153]
Key management: Complex procedures for generating, distributing, and storing keys
securely
Algorithm vulnerabilities: Cryptographic systems susceptible to various attacks (brute-
force, side-channel)
Dependency risks: Security relies entirely on strength of underlying algorithms
Key compromise: If keys are stolen/compromised, entire system security is undermined
Operational Issues: [164] [151]
Regulatory compliance: Navigating complex and varying international cryptography laws
Skill requirements: Demands specialized knowledge and training for implementation
Cost implications: Expensive to implement and maintain robust cryptographic systems
Misuse potential: Can be exploited for illegal activities, hindering law enforcement

11. Public Key Infrastructure (PKI)

Definition and Purpose


PKI is a comprehensive framework that manages digital certificates and public-private key
pairs for secure electronic communication [165] [166]
Primary function is to enable secure authentication, encryption, and digital signatures
across networks [167]
Trust model that binds public keys with respective user identities through digital
certificates [166]
Centralized system for creating, managing, distributing, using, storing, and revoking digital
certificates [168]

Core Components of PKI

A. Certificate Authority (CA)


Primary Functions: [169] [165]
Issues digital certificates to users, devices, and services after identity verification
Signs certificates with its private key to establish authenticity
Manages certificate lifecycle including issuance, renewal, and revocation
Maintains certificate repository for public access and verification
Types of Certificate Authorities: [170]
Root CA: Top-level authority in PKI hierarchy, self-signed certificates
Subordinate/Intermediate CA: Issues certificates under Root CA authority
Bridge CA: Facilitates cross-certification between different PKI domains [171] [172]
Key Responsibilities: [165] [170]
Identity verification through official documentation before certificate issuance
Certificate validation to prove certificate authenticity and validity
Policy enforcement ensuring compliance with established security standards
Security maintenance protecting CA private keys using Hardware Security Modules
(HSMs)

B. Registration Authority (RA)


Core Functions: [169] [165]
Identity verification of certificate applicants on behalf of CA
Application processing for certificate requests
Certificate lifecycle support including renewal and revocation requests
Policy enforcement ensuring compliance with certificate policies
Operational Model: [169]
Authorized by CA to perform specific certificate management functions
Can be separate entity or CA can perform RA functions directly
Maintains encrypted database of all certificate transactions
Provides front-end services for certificate applicants
C. Digital Certificates
Structure and Content: [170] [165]
X.509 standard format containing public key and identity information
Digitally signed by CA to ensure authenticity and integrity
Contains metadata including validity period, usage restrictions, and revocation information
Serves as digital passport linking public key to verified identity
Certificate Types: [170]
Server certificates: For SSL/TLS web security
Client certificates: For user authentication
Code signing certificates: For software integrity
Email certificates: For secure email communication

D. Certificate Database and Repository


Functions: [166] [165]
Stores issued certificates making them publicly accessible
Maintains certificate metadata including validity periods and revocation status
Provides lookup services for certificate verification
Archives historical data for audit and compliance purposes

E. Certificate Management System


Capabilities: [173] [166]
Automates certificate lifecycle from issuance to revocation
Provides administrative interface for CA operations
Manages certificate policies and enforcement procedures
Integrates with enterprise systems for seamless certificate deployment

PKI Trust Models

A. Hierarchical Trust Model


Structure: [172]
Root CA at top of hierarchy provides ultimate trust anchor
Intermediate CAs operate under Root CA authority
End-entity certificates issued by intermediate CAs
Chain of trust links all certificates back to trusted root
Advantages: [172]
Centralized control over certificate policies and procedures
Scalable architecture suitable for large organizations
Clear trust relationships with defined hierarchy levels
Simplified trust validation through certificate chains

B. Bridge Trust Model


Architecture: [171] [172]
Bridge CA acts as intermediary between different PKI domains
Cross-certification establishes trust relationships between separate PKIs
Peer-to-peer connections through central bridge authority
Maintains autonomy of individual PKI domains while enabling interoperability
Benefits: [171]
Reduced complexity compared to full mesh cross-certification
Organizational independence while enabling inter-domain communication
Flexible trust relationships that can be established or removed as needed
Scalable solution for multiple organizational PKIs

C. Hybrid Trust Model


Characteristics: [172]
Combines hierarchical and bridge models for maximum flexibility
Multiple trust paths available for certificate validation
Complex trust relationships supporting diverse organizational needs
Enhanced redundancy through multiple validation pathways

Certificate Lifecycle Management

Certificate Issuance Process [174] [173]


Application submission with required identity documentation
Identity verification by RA using established procedures
Certificate generation by CA with appropriate policies applied
Certificate publication to repository for public access
Installation and deployment to target systems and applications
Certificate Renewal and Re-keying [173]
Automated monitoring of certificate expiration dates
Renewal notifications sent to certificate owners before expiration
Re-keying procedures when new key pairs are required
Seamless replacement of expiring certificates to prevent service disruption

Certificate Revocation [175] [173]


Revocation Methods: [176] [175]
Certificate Revocation Lists (CRLs): Periodically published lists of revoked certificates
Online Certificate Status Protocol (OCSP): Real-time certificate status checking
OCSP Stapling: Server-provided certificate status to improve performance
Revocation Reasons: [177]
Key compromise or suspected compromise
Certificate holder identity change or termination
CA compromise requiring revocation of all issued certificates
Policy violations or non-compliance with certificate terms

PKI Applications and Use Cases


Web Security: [152]
SSL/TLS certificates for secure web communications
HTTPS protocol ensuring encrypted web transactions
Server authentication verifying website identity
Client certificates for strong user authentication
Email Security: [152]
S/MIME protocol for encrypted and signed email
Digital signatures proving email authenticity and integrity
Email encryption protecting confidential communications
Non-repudiation preventing denial of email transmission
Enterprise Applications: [178]
VPN authentication for secure remote access
Code signing ensuring software integrity and publisher verification
Document signing for legal validity of electronic documents
Device authentication in IoT and enterprise networks
PKI Challenges and Limitations

Security Vulnerabilities [179] [177]


Key compromise risks if private keys are stolen or exposed
CA compromise potentially undermining entire trust model
Certificate revocation delays creating windows of vulnerability
Misconfiguration errors leading to security weaknesses

Operational Challenges [180] [164]


Complex key management requiring specialized expertise and procedures
Scalability issues in large deployments with thousands of certificates
Certificate lifecycle complexity with manual processes prone to errors
Interoperability problems between different PKI implementations

Cost and Resource Requirements [179]


High implementation costs for hardware, software, and expertise
Ongoing maintenance expenses for CA operations and certificate management
Compliance costs meeting regulatory and audit requirements
Training requirements for personnel managing PKI systems

Validation Authority (VA)


Core Functions: [181]
Provides certificate validation services including CRL and OCSP responses
Maintains certificate status information updated by issuing CAs
Offers real-time verification of certificate validity
Supports multiple validation protocols for diverse application needs
Integration with PKI: [181]
Receives status updates from Certificate Authorities
Maintains backend storage of certificate revocation information
Provides OCSP responder services for online certificate checking
Supports CRL distribution for offline certificate validation
This comprehensive framework of cryptography and PKI provides the foundation for secure
digital communications, enabling trust, authenticity, and confidentiality in modern electronic
transactions while addressing the complex challenges of key management, certificate lifecycle,
and trust establishment across diverse organizational boundaries.

1. [Link]
d=13012&sectionno=3&orderno=3
2. [Link]
3. [Link]
4. [Link]
5. [Link]
6. [Link]
d=13013&sectionno=3A&orderno=4
7. [Link]
ccbe5a8
8. [Link]
9. [Link]
10. [Link]
11. [Link]
12. [Link]
4
13. [Link]
14. [Link]
15. [Link]
16. [Link]
5_76_00001_200021_1517807324077&orderno=18&orgactid=AC_CEN_45_76_00001_200021_151780732
4077
17. [Link]
18. [Link]
19. [Link]
gnature])-the-information-technology-act,.html
20. [Link]
21. [Link]
dia
22. [Link]
23. [Link]
ac3f5e
24. [Link]
25. [Link]
26. [Link]
=20
27. [Link]
c93834e
28. [Link]
29. [Link]
30. [Link] of electronic [Link]
31. [Link]
57fb8b
32. [Link]
33. [Link]
b8b54bc
34. [Link]
tronic-signature
35. [Link]
36. [Link]
37. [Link]
dure-rules-2015/9455
38. [Link]
=19
39. [Link]
bububjxcgfvsbdihbgfGhdfgFHytyhRtMTk4NzY=
40. [Link]
41. [Link]
00000111000&searchfilter=&k=&isdlg=1
42. [Link]
43. [Link]
961-1969
44. [Link]
45. [Link]
46. [Link]
[Link]
47. [Link]
48. [Link]
49. [Link]
50. [Link]
51. [Link]
signature
52. [Link]
53. [Link]
54. [Link]
55. [Link]
56. [Link]
-digital-signature
57. [Link]
58. [Link]
[Link]
59. [Link]
60. [Link]
61. [Link]
62. [Link]
63. [Link]
64. [Link]
65. [Link]
66. [Link]
67. [Link]
pdf
68. [Link]
69. [Link] Appreciation of Electronic
[Link]
70. [Link]
71. [Link]
evidence-under-section-65b-of-the-evidence-act/
72. [Link]
ce-without-certificate-under-section-65b-of-evidence-act-1872/
73. [Link]
74. [Link]
75. [Link]
76. [Link]
INDIAN-EVIDENCE-ACT-1872
77. [Link]
78. [Link]
79. [Link]
a10507d7e4d44e5
80. [Link]
42fb4b8
81. [Link]
82. [Link]
83. [Link]
84. [Link]
d9710ff
85. [Link]
86. [Link]
_Foreign_Certifying_Authorities.pptx
87. [Link]
ot-operating-under-a-regulatory-authority-regulations-2013/C90D
88. [Link]
ology+Act%2C+2000&STitle=Power+to+delegate
89. [Link]
of-certifying-authorities/
90. [Link]
d=13041&sectionno=28&orderno=32
91. [Link]
92. [Link]
93. [Link]
94. [Link]
95. [Link]
96. [Link]
5e59d11b
97. [Link]
98. [Link]
99. [Link]
100. [Link]
fying+Authorities)+Rules%2C+2000
101. [Link]
[Link]
102. [Link]
103. [Link]
104. [Link]
105. [Link]
106. [Link]
tronic-signature
107. [Link]
108. [Link]
109. [Link]
110. [Link]
111. [Link]
112. [Link]
113. [Link]
114. [Link]
=23
115. [Link]
ty
116. [Link]
117. [Link]
118. [Link]
119. [Link] of Foreign CA G.S.R 205 (E).pdf
120. [Link] Border Recognition of Certifying Authorities
-7 Sep [Link]
121. [Link]
2Frulesindividualfile%2F&file=rules_2000_it(certifying_authority)[Link]
122. [Link]
123. [Link]
124. [Link]
bububjxcgfvsbdihbgfGhdfgFHytyhRtMTk4NzY=
125. [Link]
126. [Link]
127. [Link]
128. [Link]
3_1564980505020&orderno=27&orgactid=AC_RJ_83_1148_00003_00003_1564980505020
129. [Link]
130. [Link] (1).pdf
131. [Link]
132. [Link]
133. [Link]
5AjMtQWa
134. [Link]
=87
135. [Link]
5AjMtQWa?pageTitle=Rules-for-Information-Technology-Act-2000
136. [Link]
137. [Link]
138. [Link] Technology (certifying Authorities)
Amendment Rules, [Link]
139. [Link]
_68/section_68.html
140. [Link]
=39
141. [Link]
142. [Link]
143. [Link]
144. [Link]
145. [Link]
146. [Link]
147. [Link]
e3386446
148. [Link]
149. [Link]
150. [Link]
151. [Link]
152. [Link]
153. [Link]
154. [Link]
key-encryption/
155. [Link]
156. [Link]
157. [Link]
158. [Link]
159. [Link]
160. [Link]
161. [Link]
162. [Link]
163. [Link]
ures
164. [Link]
165. [Link]
lic-key-infrastructure
166. [Link]
167. [Link]
168. [Link]
169. [Link]
170. [Link]
s/
171. [Link]
172. [Link]
173. [Link]
174. [Link]
ycle
175. [Link]
176. [Link]
177. [Link]
w
178. [Link]
179. [Link]
180. [Link]
181. [Link]
182. [Link]
183. [Link]
184. [Link]
185. [Link]
186. [Link]
187. [Link]
188. [Link]
189. [Link] notes/NTC/[Link]
190. [Link]
191. [Link]
192. [Link]
193. [Link]
194. [Link]
e-authentication-codes-digital-signatures
195. [Link]
196. [Link]
ature-1
197. [Link]
198. [Link]
199. [Link] Border Recognition of Certifying Authorities
-7 Sep [Link]
200. [Link]
201. [Link]
202. [Link]
ons/Cert_Validation_CRL_and_OCSP.htm
203. [Link]
204. [Link]
205. [Link]
htm
206. [Link] [Link]
207. [Link]

Common questions

Powered by AI

Under the IT Act's regulatory framework, digital signatures, which rely on a cryptographic system involving both private and public keys, provide a higher level of security and legal recognition due to their robust encryption methods. Electronic signatures, on the other hand, offer more flexibility by encompassing a range of authentication techniques. While digital signatures are integral for scenarios where high integrity and security are paramount, electronic signatures provide versatility and ease of use. The regulatory flexibility ensures that both types can be effectively employed, depending on the transaction's security requirements .

The technology-neutral approach of the IT Act, embodied in Section 3A, offers flexibility by allowing both digital signatures based on cryptography and other electronic authentication techniques, thereby accommodating advancements in technology. This promotes innovation and wider adoption of electronic signatures in various industries, which benefits digital transactions by providing multiple secure, authenticated means of signing. It also enables adoption across diverse platforms and devices, fostering integration and interoperability in digital environments .

Section 3A of the Information Technology Act expands the scope of electronic signatures by introducing a technology-neutral stance that recognizes methods beyond cryptographic digital signatures. It allows for electronic authentication techniques deemed reliable if they fulfill certain criteria, such as unique linkage and exclusive control over authentication data, detectability of alterations post-signature, and adherence to additional conditions prescribed by the government. This broadens authentication possibilities to include newer technologies and enhances flexibility in application, thus supporting evolving e-commerce and e-governance landscapes without compromising security standards .

The 'unique linkage' and 'exclusive control' criteria are crucial under the Information Technology Act as they ensure that electronic signatures are both authentic and cannot be repudiated. 'Unique linkage' implies that the signature creation data must link exclusively to the signatory, confirming the identity of the signer in context. 'Exclusive control' ensures that the signatory has sole control over the data at the time of signing, preventing unauthorized alterations. Together, these criteria maintain the integrity and non-repudiation of electronic signatures, thereby supporting their reliability and legal acceptance .

The Information Technology Act establishes a temporal framework for security by stating in Section 14 that an electronic record is deemed secure from the time when a security procedure is applied until its verification. This ensures that the record's integrity is maintained during the entire period it's considered secure, providing continuity of protection from creation to verification. This framework is important as it gives records legal weight and presumed integrity in court, minimizing disputes over authenticity and enhancing trust in electronic transactions .

Under the Indian legal framework, secure electronic signatures enjoy significant legal presumptions, as detailed in Section 15 and Section 67A of the Indian Evidence Act. A secure electronic signature is presumed to belong to the signer, and courts assume it was affixed with the intention to sign the document, thus reducing the burden of proof for the party relying on such a signature in legal proceedings. This shifts the onus of disproof to the contesting party, thereby simplifying legal processes and enhancing the acceptance of digital evidence in court .

A hash function in cryptography is critical in securing electronic records by converting data into a fixed-size hash value or hash result, ensuring that any alteration in the data generates a substantially different hash. Its computational infeasibility to reverse-engineer the original data from the hash is crucial, as it prevents unauthorized reconstruction or interception of the data. This irreversibility ensures not only the data's integrity by immediately flagging any alterations but also its confidentiality, forming a cornerstone of secure digital transactions and communications .

Section 16 of the Information Technology Act empowers the Central Government to prescribe security procedures and practices for electronic records and signatures. This authority allows for the establishment and updating of comprehensive security standards to address the evolving technological landscape and security challenges. By doing so, the government ensures that both records and signatures adhere to appropriate security measures, providing flexibility to adapt to various transaction types and business environments .

The Information Technology Act, 2000 ensures the authenticity and integrity of electronic records through digital signatures and cryptographic techniques. Section 3 provides that electronic records can be authenticated by digital signatures, which use asymmetric cryptographic systems and hash functions to transform and secure the records. This framework ensures that any alteration to the record can be detected, maintaining both integrity and authenticity of the document. The Act's use of a pair of private and public keys allows for universal verification of signatures while safeguarding against unauthorized access .

The asymmetric cryptosystem is critical to maintaining the integrity and authenticity of electronic documents under the IT Act, 2000 because it involves the use of a pair of mathematically related keys—a private key for creating digital signatures and a public key for verifying them. This system ensures that the signer alone can create a valid signature with their private key, while anyone with access to the corresponding public key can verify the signature's authenticity without compromising the private key. This framework prevents unauthorized changes and ensures non-repudiation, making digital transactions secure and reliable .

You might also like