Shubham Sharma

 Username and Password are the only things in a
Digital Signature.
 Any electronic document is a valid document, no
need not signed because it is computer generated.
 Digital Signature are for personal use and can’t be
kept in court for perusal.
Common Myths

 To provide Authenticity, Integrity and Non-
repudiation to electronic documents.
Why Digital Signatures
?

 Digital code attached to an electronically transmitted
document to verify its contents and the sender's identity.
 Digital Signature of a person therefore varies from
document to document thus ensuring authenticity of
each word of that document.
What is Digital Signature?

 Symmetric encryption uses the identical key to both
encrypt and decrypt the data.
Symmetric/Asymmetric Encryption

 Two related keys (public and private) for data
encryption and decryption.
 The private key is never exposed.
 Takes away the security risk of key sharing.
Asymmetric
Digital signature & PKI Infrastructure

Message
+
Signature
Hash
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
Message
+
signature
COMPARE
Calculated
HashMessage
Sender Receiver
Hash
Sent thru’ Internet
if
OK
Signatures
verified
Signed Messages
Digital signature & PKI Infrastructure

PIN Protected Soft Tokens
 Private key is encrypted and kept on
the Hard Disk in a file, this file is
password protected.
 Forms the lowest level of security in
protecting the key, as
 The key is highly reachable.
 PIN can be easily known or cracked.

 Private key is generated in the crypto module residing in the
smart card.
 The key is kept in the memory of the smart card.
 The key is highly secured as it doesn’t leave the card.
 The message digest is sent inside the card for signing, and the
signatures leave the card.
Smart Cards

Hardware Tokens
 They are similar to smart cards in
functionality as
 Key is generated inside the token.
 Key is highly secured as it doesn’t
leave the token.
 Highly portable.
 Machine Independent.

 Class 0 : Issued only for demonstration/ test purposes.
 Class 1 : Confirms user's name and E-mail address.
 Class 2 : Issued for both business personnel and private
individuals use. Information in the application provided by the
subscriber does not conflict with the information in well-
recognized consumer databases.
 Class 3 : This certificate issued to individuals as well as
organizations. High assurance certificates. Issued to individuals
only on their personal (physical) appearance before the
Certifying Authorities.
Different Classes of Digital
Signatures

 The pattern also has some (possible) liabilities:
 Both participants must trust the identity of each other.
 Thus, certificates issued by some certification
authority are needed.
 Both the sender and the receiver have to previously
agree what cryptographic algorithm they support.
Liabilities

Public Key Infrastructure
(PKI)

Trusted Agency is required which certifies the
association of an individual with the key pair.
Certifying Authority (CA)
This association is done by issuing a
certificate to the user by the CA
Public key certificate (PKC)
All public key certificates are digitally signed
by the CA.
Public Key Infrastructure

• Controller is the Root certifying authority responsible for
regulating Certifying Authorities (CAs).
• CA Must be widely known and trusted.
• CA must have well defined Identification process before
issuing the certificate.
• CA certifies the association of an individual with his
public key.
• Provides online access to the list of certificates revoked.
• Displays online the license issued by the Controller.
Certifying Authority

Paper Electronic
IDRBT Certificate

Public-Key Certification
Signed
by using
CA’s
private
key
User
Name &
other
credentials
User’s
Public
key
User Certificate
Certificate
Database
Publish
Certificate
Request
User Name
User’s
Public Key
CA’s Name
Validity
Digital
Signature
of CA
Certificate
Class
User’s Email
Address
Serial No.
Key pair
Generation
Private
Public
Web site of CA
User 1 certificate
User 2 certificate
.
Public
License issued
by CCA
Digital signature & PKI Infrastructure

• There are only 6 certificate Authorities
1. Safescrypt
2. iTrust (IDRBT)
3. National Informatics Centre(NIC)
4. Tata Consultancy Services
5. (n)Code Solutions
6. e-Mudhra
 There is only one Root Certificate Authority
 Root Certifying Authority of India (RCAI)
CA’s of India

Tragedy!!

Battle is ON!!

 Download and install Gpg4Win(supports Outlook).
 Download and install Thunderbird.
 Add extension Engimail (adds OpenPGP message
encryption and authentication to your thunderbird
client.)
 Create your key pair.
 Encrypt/Sign on the go !!
DEMO Steps

Would like to hear from you !!
Thank You !!
Email-
shubham.sharma3005@gmail.com

More Related Content

PPTX
Public key infrastructure
PPTX
Digital signature & certificate
PPT
Presentation on digital signatures & digital certificates
PPTX
Digital certificates
PPT
Digital signature
PPTX
Encryption ppt
PPTX
SSL TLS Protocol
PPT
Ssl (Secure Sockets Layer)
Public key infrastructure
Digital signature & certificate
Presentation on digital signatures & digital certificates
Digital certificates
Digital signature
Encryption ppt
SSL TLS Protocol
Ssl (Secure Sockets Layer)

What's hot (20)

PPTX
Basic cryptography
PPT
Digital certificates
PPT
DIGITAL SIGNATURE
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPT
Cryptography
PPT
6. cryptography
PPTX
Encryption And Decryption Using AES Algorithm
PPT
Fundamentals of cryptography
PPTX
Advanced cryptography and implementation
PPTX
public key infrastructure
PPTX
Cryptography.ppt
PPTX
Digital certificates
PPTX
Authentication
PPTX
Data Leakage Prevention
PDF
PCI-DSS_Overview
PPTX
Digital certificates and information security
PDF
Network Security Tutorial | Introduction to Network Security | Network Securi...
PDF
Public key Infrastructure (PKI)
PDF
What is Penetration & Penetration test ?
PPTX
Ethical Hacking
Basic cryptography
Digital certificates
DIGITAL SIGNATURE
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cryptography
6. cryptography
Encryption And Decryption Using AES Algorithm
Fundamentals of cryptography
Advanced cryptography and implementation
public key infrastructure
Cryptography.ppt
Digital certificates
Authentication
Data Leakage Prevention
PCI-DSS_Overview
Digital certificates and information security
Network Security Tutorial | Introduction to Network Security | Network Securi...
Public key Infrastructure (PKI)
What is Penetration & Penetration test ?
Ethical Hacking
Ad

Viewers also liked (8)

PDF
Building basic public key infrastucture (PKI)
PPTX
IT act 2000
PPTX
Implementing a Secure and Effective PKI on Windows Server 2012 R2
PPTX
CYBER Crime Cyber Security Cyber Law INDIA
PPT
PKI and Applications
PPTX
Pki for dummies
PPTX
Unit 5 consumer protection and introduction to cyber law
PDF
Crypto and PKI
Building basic public key infrastucture (PKI)
IT act 2000
Implementing a Secure and Effective PKI on Windows Server 2012 R2
CYBER Crime Cyber Security Cyber Law INDIA
PKI and Applications
Pki for dummies
Unit 5 consumer protection and introduction to cyber law
Crypto and PKI
Ad

Similar to Digital signature & PKI Infrastructure (20)

PPT
Digital Signature.ppt power ponit presentation
PPT
PKI_Applications digital certificate.ppt
PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
Digital signatures
PPT
Digital Signature
PPT
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
PPT
ccapresentation.ppt
PPT
Digital signature online - What is digital signature
PPTX
Digital-Signatures.pptx POWERPOINT PRESENTATION FOR class
DOCX
PPTX
Digital signature
PDF
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
PDF
Digital signatures
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
PPTX
Digital certificates
PPTX
Digital signatures
PPT
Digital signature introduction
PPTX
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
PPTX
Hashes_and_Digital_Signatures_Slides.pptx
Digital Signature.ppt power ponit presentation
PKI_Applications digital certificate.ppt
Public Key Infrastructure and Application_Applications.ppt
Digital signatures
Digital Signature
ccapresentation DSAhhhjjjjjdjdjdjdjd.ppt
ccapresentation.ppt
Digital signature online - What is digital signature
Digital-Signatures.pptx POWERPOINT PRESENTATION FOR class
Digital signature
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
Digital signatures
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & personal digital certificates, securing sensitive electronic communicat...
Digital certificates
Digital signatures
Digital signature introduction
lec 1 - Unit 4- Lcture -3 Digital Signmmmmmmmmmmmmmmmmmmmatures.pptx
Hashes_and_Digital_Signatures_Slides.pptx

Recently uploaded (20)

PPTX
Dating App Development Cost: Factors, Features & Estimates
PPTX
Chapter 1_Overview hhhhhhhhhhhhhhhhhhhhhhhhhh
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PDF
B450721.pdf American Journal of Multidisciplinary Research and Review
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
Introduction: Living in the IT ERA.pptx
PPT
chapter 5: system unit computing essentials
PPTX
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PPTX
Data Flows presentation hubspot crm.pptx
PDF
Information Technology practical assignment
PPTX
c_languagew_structure_and_functions.pptx
PPTX
IT-Human Computer Interaction Report.pptx
PDF
B2B Marketing mba class material for study
DOCX
Audio to Video AI Technology Revolutiona
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PPTX
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
PDF
How Technology Shapes Our Information Age
PPT
Expect The Impossiblesssssssssssssss.ppt
Dating App Development Cost: Factors, Features & Estimates
Chapter 1_Overview hhhhhhhhhhhhhhhhhhhhhhhhhh
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
B450721.pdf American Journal of Multidisciplinary Research and Review
JuanConnect E-Wallet Guide for new users.pdf
Introduction: Living in the IT ERA.pptx
chapter 5: system unit computing essentials
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
Lesson.-Reporting-and-Sharing-of-Findings.pdf
Data Flows presentation hubspot crm.pptx
Information Technology practical assignment
c_languagew_structure_and_functions.pptx
IT-Human Computer Interaction Report.pptx
B2B Marketing mba class material for study
Audio to Video AI Technology Revolutiona
Digital Project Mastery using Autodesk Docs Workshops
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
How Technology Shapes Our Information Age
Expect The Impossiblesssssssssssssss.ppt

Digital signature & PKI Infrastructure

  • 2.   Username and Password are the only things in a Digital Signature.  Any electronic document is a valid document, no need not signed because it is computer generated.  Digital Signature are for personal use and can’t be kept in court for perusal. Common Myths
  • 3.   To provide Authenticity, Integrity and Non- repudiation to electronic documents. Why Digital Signatures ?
  • 4.   Digital code attached to an electronically transmitted document to verify its contents and the sender's identity.  Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. What is Digital Signature?
  • 5.   Symmetric encryption uses the identical key to both encrypt and decrypt the data. Symmetric/Asymmetric Encryption
  • 6.   Two related keys (public and private) for data encryption and decryption.  The private key is never exposed.  Takes away the security risk of key sharing. Asymmetric
  • 8.  Message + Signature Hash Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key Message + signature COMPARE Calculated HashMessage Sender Receiver Hash Sent thru’ Internet if OK Signatures verified Signed Messages
  • 10.  PIN Protected Soft Tokens  Private key is encrypted and kept on the Hard Disk in a file, this file is password protected.  Forms the lowest level of security in protecting the key, as  The key is highly reachable.  PIN can be easily known or cracked.
  • 11.   Private key is generated in the crypto module residing in the smart card.  The key is kept in the memory of the smart card.  The key is highly secured as it doesn’t leave the card.  The message digest is sent inside the card for signing, and the signatures leave the card. Smart Cards
  • 12.  Hardware Tokens  They are similar to smart cards in functionality as  Key is generated inside the token.  Key is highly secured as it doesn’t leave the token.  Highly portable.  Machine Independent.
  • 13.   Class 0 : Issued only for demonstration/ test purposes.  Class 1 : Confirms user's name and E-mail address.  Class 2 : Issued for both business personnel and private individuals use. Information in the application provided by the subscriber does not conflict with the information in well- recognized consumer databases.  Class 3 : This certificate issued to individuals as well as organizations. High assurance certificates. Issued to individuals only on their personal (physical) appearance before the Certifying Authorities. Different Classes of Digital Signatures
  • 14.   The pattern also has some (possible) liabilities:  Both participants must trust the identity of each other.  Thus, certificates issued by some certification authority are needed.  Both the sender and the receiver have to previously agree what cryptographic algorithm they support. Liabilities
  • 16.  Trusted Agency is required which certifies the association of an individual with the key pair. Certifying Authority (CA) This association is done by issuing a certificate to the user by the CA Public key certificate (PKC) All public key certificates are digitally signed by the CA. Public Key Infrastructure
  • 17.  • Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs). • CA Must be widely known and trusted. • CA must have well defined Identification process before issuing the certificate. • CA certifies the association of an individual with his public key. • Provides online access to the list of certificates revoked. • Displays online the license issued by the Controller. Certifying Authority
  • 19.  Public-Key Certification Signed by using CA’s private key User Name & other credentials User’s Public key User Certificate Certificate Database Publish Certificate Request User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No. Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA
  • 21.  • There are only 6 certificate Authorities 1. Safescrypt 2. iTrust (IDRBT) 3. National Informatics Centre(NIC) 4. Tata Consultancy Services 5. (n)Code Solutions 6. e-Mudhra  There is only one Root Certificate Authority  Root Certifying Authority of India (RCAI) CA’s of India
  • 24.   Download and install Gpg4Win(supports Outlook).  Download and install Thunderbird.  Add extension Engimail (adds OpenPGP message encryption and authentication to your thunderbird client.)  Create your key pair.  Encrypt/Sign on the go !! DEMO Steps
  • 25.  Would like to hear from you !! Thank You !! Email- [email protected]