Friday, 28 March 2014
DGFT Digital Signature | (n)Exim Digital Signature|SafeExim Digital Signature
23:03
11 comments
A Digital Signature is required to digitally sign any
documents in electronic format or for transactions being performed through a web-browser.
DGFT Digital Signature is one of the many types of Digital Signature Certificates (DSC) which is only provided by two certifying authorities (CA)
in India i.e. (n)Code Solutions & Safe Scrypt.
Safe Scrypt launch this product with name Safe EXIM or
Safeexim or Safe-Exim whereas (n) Code Solutions Launch this with name (n)exim
or (n)Exim or (n) Exim.
With a DGFT Digital Signature or Safeexim or (n)Exim you can
apply for licenses electronically with the DGFT and digitally sign your online
license application using your Safeexim or (n)Exim DGFT Digital Signature.
(n)Exim is a special kind of DSC exclusively for the EXIM Community of India. It is issued to Organizations/
People who have obtained a valid IEC Code. It is mandatory to have a (n)eXIM to
able to communicate with DGFT online.
Benefits of DGFT Digital Signature / (n)Exim Digital
Signature / Safe exim Digital Signature :
Cost Savings - DGFT has extended attractive Monetary
incentives amounting to 50 % waiver on license fee for those Exporters &
Importers using DGFT Digital Signature Certificates or (n)Exim Digital
Signature.
Less Paper Work: DGFT Digital Signature also reduces
paperwork considerably for the user, thus down the associated costs, Reduced
Turnaround Time, Convenience.
Security: Login to DGFT Portal using a DGFT Digital
signature is far more secure than using a ID & Password Confidentiality,
Integrity, Non- Repudiation, thus bringing Trust and Confidence into online
experience.
Who Can use DGFT Digital Signature or (n)Exim or Safeexim
DGFT Digital Signature :
- DGFT Digital Signature is opened to Only Importers -
Exporters who have a valid IEC Code from DGFT Department.
- Any person from an EXIM Org. who is authorized to transact
with DGFT on behalf of the Org.
DOCUMENTS REQUIRED & TO BE SUBMITTED BY THE APPLICANT:
1. Attested* Copy as ID Proof of Anyone:
- Passport
- Driving License
- PAN Card Copy
- Govt. Issued ID card
2. Attested* Copy as Address Proof of Anyone:
- Passport
- Driving License
- Latest Utility Bill (Telephone Bill / Electricity Bill /
LIC Receipt)
3. Latest Photograph of Applicant (Must be pasted on Form
with Crossed Signature)
4. Proof of Right to do Business: (Any One Copy)
- MOA/COI if Pvt. Ltd
- Partnership Deed if Partnership Firm
- Valid Business License if Prop.)
5. Proof of Right to do Business: (Any One Copy)
- Annual Report
- Income Tax Return
- Org. Bank Details on Bank Letter Head
- Statement of Income by CA
6. Authorization Letter by Company on Company's Letter Head.
7. IEC Certificate Photocopy
Digital signatures must for PF requests
05:37
2 comments
The Employees Provident Fund Organisation (EPFO) has appealed to establishments to furnish electronically authenticated records through use of digital signature (class 2, Class 3, DGFT and above) while submitting statutory returns, claim forms, and requests of other services.
e-governance reforms
The move is in line with the EPFO’s e-governance reforms that are aimed at making its services more efficient and transparent.
Establishments covered under Employees Provident Funds and Miscellaneous Provisions Act 1952 have to register at least one Digital Signature Certificate Class 2, Digital Signature Certificate Class 3, Digital Signature Certificate for e-Tendering and above, of their employer with the EPFO.
Establishments with more than 500 members would have to register by April 30 and establishments with 101-500 members, by June 30, Prasanth K., Regional Provident Fund Commissioner, Kozhikode, said on Thursday.
Establishments covered under Employees Provident Funds and Miscellaneous Provisions Act 1952 have to register at least one Digital Signature Certificate Class 2, Digital Signature Certificate Class 3, Digital Signature Certificate for e-Tendering and above, of their employer with the EPFO.
Establishments with more than 500 members would have to register by April 30 and establishments with 101-500 members, by June 30, Prasanth K., Regional Provident Fund Commissioner, Kozhikode, said on Thursday.
Wednesday, 26 March 2014
E-filing of returns: Taxpayers to get digital signatures
07:39
3 comments
In order to weed out the hassle of sending by post a hard copy of e-filed return, the Income Tax department has decided to bring in the facility of digital signatures (DS) for taxpayers to endorse their bona fides.
The Central Board of Direct Taxes, the apex office to formulate policies for the Income Tax department, has decided to implement the new mechanism by the end of the next financial year in March 2015.
Official sources privy to the development told PTI that the Central Board of Direct Taxes will get in touch with the Union Ministries of Law and Communications and Information Technology to establish the legal position and technology requirements respectively before it operationalizes the new protocols for the e-returns called 'ITRV'.
"It has to be seen what will be the procedure to obtain electronic or DS by the taxpayers. There should not be an additional cost or procedural burden for the taxpayer who opts to file his or her I-T return online," a senior official said.
In case of digital signatures (used by corporate entities as of now), a bona fide statement that verifies the identity of the sender, it is required to be created by paying a fee and this requires regular renewal, which is why this is being seen as a burden on salaried class and other categories of small taxpayers.
The department, within the same time-frame, is also desirous of enabling the e-filing of TDS statements through its official web portal which is used by taxpayers currently to file their electronic returns.
As per the norms in force at present, a taxpayer who files an e-return has to mandatory send a copy of the same by post to the I-T department's Central Processing Center (CPC) in Bangalore.
However, in many cases, the post would not reach the CPC and hence the tax department categorized the taxpayer's return as null and void.
The department, sources said, wants to promote e-filing of I-T returns and it desires that e-filing should be "hassle-free and sans any glitches", which will prompt more people to file their tax returns by this way.
The I-T department is also bolstered by the fact that more and more people are opting to file their returns online.
As per existing rules, the CPC, on receipt of the posted 'ITRV', sends an electronic acknowledgment to the tax return filer.
The problem arises when the document sent by post does not reach the CPC because of lapses on the part of the taxpayer or some other reason.
Apply online Digital Signature Certificate by Digital Signature Mart provider in India at the lowest price.
The Central Board of Direct Taxes, the apex office to formulate policies for the Income Tax department, has decided to implement the new mechanism by the end of the next financial year in March 2015.
Official sources privy to the development told PTI that the Central Board of Direct Taxes will get in touch with the Union Ministries of Law and Communications and Information Technology to establish the legal position and technology requirements respectively before it operationalizes the new protocols for the e-returns called 'ITRV'.
"It has to be seen what will be the procedure to obtain electronic or DS by the taxpayers. There should not be an additional cost or procedural burden for the taxpayer who opts to file his or her I-T return online," a senior official said.
In case of digital signatures (used by corporate entities as of now), a bona fide statement that verifies the identity of the sender, it is required to be created by paying a fee and this requires regular renewal, which is why this is being seen as a burden on salaried class and other categories of small taxpayers.
The department, within the same time-frame, is also desirous of enabling the e-filing of TDS statements through its official web portal which is used by taxpayers currently to file their electronic returns.
As per the norms in force at present, a taxpayer who files an e-return has to mandatory send a copy of the same by post to the I-T department's Central Processing Center (CPC) in Bangalore.
However, in many cases, the post would not reach the CPC and hence the tax department categorized the taxpayer's return as null and void.
The department, sources said, wants to promote e-filing of I-T returns and it desires that e-filing should be "hassle-free and sans any glitches", which will prompt more people to file their tax returns by this way.
The I-T department is also bolstered by the fact that more and more people are opting to file their returns online.
As per existing rules, the CPC, on receipt of the posted 'ITRV', sends an electronic acknowledgment to the tax return filer.
The problem arises when the document sent by post does not reach the CPC because of lapses on the part of the taxpayer or some other reason.
Apply online Digital Signature Certificate by Digital Signature Mart provider in India at the lowest price.
Friday, 14 March 2014
Digital Signatures to bring in paperless services
06:14
7 comments
In less than a decade, we anticipate to see 90% of
government operations through paperless services, wherein digital signatures
will be using by the governing authorities.
Apply Online Digital Signature Certificate for DGFT, e-Tendering, IRCTC, Class 2, Class 3 in India by Digital Signature Mart.
Can Digital Signatures bring an ease in the governance process?
The idea of Digital Signature is always advancing in India. Digital
Signatures could be recognized as a compelling mode for delivering paperless
official services. The usage of technology in an able way can help in
displacing the physical personal signatures to digital signatures, which can
convey the same authentication value. Digital Signature could be executed in
issuing certificates like area titles, examination degrees etc. Today, we see a
consistent build in electronic income transactions – between bank, client
to-bank or client to-retailer. Digital Signature can make straightforwardness
in this methodology and create a level of trust which might be of higher worth
than the physical signatures.
Share us your outlook about the acceptance among Indian masses over the credibility of Digital Signatures?
Maintaining the authenticity and believability of Digital Signatures
is an imperative angle. In India, we see a great development in the electronic
transactions. The use of credit and debit cards, ATM cards, net banking and
mobile banking services, online registration and official applications or
online complaint form are being increasingly accepted. Few states have
officially executed Digital Signatures for apportioning Land Title
authentications which were earlier authorized through physical digital
signature from the concerned authority. However, the framework necessities to
be determined on a more extensive scale and government assume a significant
part in spreading mindfulness around the masses or client base.
Can such systems be implemented in the tier-II, tier-III or interior locations?
The idea of Digital Signature works over an entire eco-system
of connectivity. Thus, connectivity requirements to be effectively established,
so even business settings in towns can use Digital Signatures for executing
obligations. Numerous more modest districts and greater towns are progressively
on the way of making such able connectivity services. Also, people are all the
more proliferating towards broadband, 2g and 3g services. The nation's more
youthful era is progressively getting to be tech-savvy. The extent of Digital
Signatures in this manner is monstrous in our nation, which is broadly
tolerating the technological pace.
Do you see a need for employing bio-metric services to supplement the implementation of Digital Signatures, especially for ensuring the credibility of the service?
I don't view such a necessity in the common circumstance. The
public is well-aware today in maintaining privacy about their vital personal
information. Masses are careful on not revealing their net-banking money or ATM
passwords or usernames being used for any indispensable purposes. Yet, few
occurrences of carelessness might be watched because of absence of mindfulness
in using such technology driven systems. Bio-metric administrations guarantee
the presence of the individual commissioned individual at spot while executing
the assignment. A client ought to be mindful and wary on not imparting his/her digital
dongles or usernames or passwords to any possible individual to maintain after
the credibility of the system.
Can digital signatures open new business prospects for private players?
Yes of course, the chance is monstrous for players included
in giving security results and public-key infrastructure (PKI) services. Furthermore,
the corporate world themselves can use and actualize digital signature for
executing their inside operations. The execution of digital signature will
bring about paperless process and simplicity in operation; and can likewise
minimize the transaction cost and time included.
How do you foresee the prospects for Digital Signatures in India?
The procedure of Digital Signatures is progressively picking
up force in our nation. In under a decade, we foresee to see 90% of government
operations through paperless services, wherein digital signature will be used
by the governing authorities. All types of digital signature official processes
like filing income tax returns, Digital Signature for e-tendering, Digital Signature for dgft, Digital Signature for irctc, custom filings etc
will be made into digitally signed documents in future. This will eventually
bring about changing the back-end operations on a digital working platform.
Consequently, while the back-end performs on digital work-floor the output like
issuing digital certificates or clearances and so on will be slowly in a
paperless mode. We see a positive acceptance and more extensive execution of digital
signature crosswise over different budgetary verticals in the coming years.
Wednesday, 19 February 2014
Soon, online filing system for babus' performance report
09:29
8 comments
NEW DELHI: To reduce bureaucratic hurdles and delays in processing appraisal reports of IAS officers, a system has been developed to facilitate online filing of their performance reports.
A software has been developed by the Department of Personnel and Training (DoPT) for the online filing of performance reports of the officers and the government is planning to start such a facility by April this year.
The move is aimed at reducing bureaucratic hurdles and delays which take place in processing the performance reports of over 4,700 IAS officers every year, a DoPT official said.
According to rules, an Annual Performance Appraisal Report (APAR) assessing the performance, character, conduct and qualities of an IAS officer shall be written for each financial year.
It acts as an important document to provide basic and vital inputs for further development of an officer in terms of his or her career progressions.
Uptil now, there was no system for filing of online appraisal reports.
A meeting was called on January 22 by the DoPT Secretary with the Principal Secretaries or Secretaries of General Administration Department or Department of Personnel of State Governments or Union Territories to demonstrate the software for online filing of APAR by IAS officers and also to assess the progress made by the states in issuing Digital Signature Certificate (DSCs) to its officers.
It was decided to examine and take corrective action against the possible ways in which the system may not function.
"States need to expedite the process of issuing DSCs so that officers can test its (system) compatibility with the system before using it in April, 2014," according to minutes of the meeting.
The officers would be given the option to delegate the recording of the PAR to their PA/PS who would then record the same in the PAR after accessing the system through their e-mail ID which too can be generated immediately.
"The privilege of sending the PAR to the next reporting authority, however, would only be with the officer himself after authentication with his DSC," it said.
The Center will organize a technical workshop for the officers of the states from February 24 to March 8, 2014.
The National Informatics Center (NIC) would release the eAPAR URL with data for the trial run for two pilot states during March 10 to March 14.
As many as 4,737 IAS officers are working in various positions across the country.
Referral Website- http://articles.economictimes.indiatimes.com/2014-02-04/news/47004858_1_ias-officers-online-filing-union-territories
Apply for Digital Signature Certificate by DSM
A software has been developed by the Department of Personnel and Training (DoPT) for the online filing of performance reports of the officers and the government is planning to start such a facility by April this year.
The move is aimed at reducing bureaucratic hurdles and delays which take place in processing the performance reports of over 4,700 IAS officers every year, a DoPT official said.
According to rules, an Annual Performance Appraisal Report (APAR) assessing the performance, character, conduct and qualities of an IAS officer shall be written for each financial year.
It acts as an important document to provide basic and vital inputs for further development of an officer in terms of his or her career progressions.
Uptil now, there was no system for filing of online appraisal reports.
A meeting was called on January 22 by the DoPT Secretary with the Principal Secretaries or Secretaries of General Administration Department or Department of Personnel of State Governments or Union Territories to demonstrate the software for online filing of APAR by IAS officers and also to assess the progress made by the states in issuing Digital Signature Certificate (DSCs) to its officers.
It was decided to examine and take corrective action against the possible ways in which the system may not function.
"States need to expedite the process of issuing DSCs so that officers can test its (system) compatibility with the system before using it in April, 2014," according to minutes of the meeting.
The officers would be given the option to delegate the recording of the PAR to their PA/PS who would then record the same in the PAR after accessing the system through their e-mail ID which too can be generated immediately.
"The privilege of sending the PAR to the next reporting authority, however, would only be with the officer himself after authentication with his DSC," it said.
The Center will organize a technical workshop for the officers of the states from February 24 to March 8, 2014.
The National Informatics Center (NIC) would release the eAPAR URL with data for the trial run for two pilot states during March 10 to March 14.
As many as 4,737 IAS officers are working in various positions across the country.
Referral Website- http://articles.economictimes.indiatimes.com/2014-02-04/news/47004858_1_ias-officers-online-filing-union-territories
Apply for Digital Signature Certificate by DSM
Tuesday, 18 February 2014
How to lock form fields using a digital signature
05:54
1 comment
Learn how to using digital signature with PDF forms.
In this info-graphic, learn how to lock certificate-based digital signature on your PDF form. Recipients of your form will be able to sign the field using the free Adobe Reader. This feature requires Acrobat Pro to reader-enable the form.
![]() |
We offer the best provider of Digital Signature Certificate in Delhi- India |
Passport Issuance to Cross One-crore Mark Soon
05:43
No comments
As the external affairs ministry gears up to issue around one crore passports this year through its 38 RPOs and 180 odd embassies and consulates around the globe, Muktesh Kumar Pardeshi, chief passport officer, clarified that there was absolutely no impediment in acheiving the milestone. Only China and the USA are the other two countries where over one crore passports are issued annually.
Addressing newsmen at the regional passport office here on Friday along with regional passport officer Dr Srikar Reddy, he said that the mee-seva model implemented in AP, which allows people to fill their online applications without the intervention of an agent is likely to be implemented across the country.
Regarding the police verification model started in the state, which could phenomenally bring down the number of days and paperwork involved, he said, “AP has shown the way.” He also informed that about Rs 103 cr out of the total revenue of Rs 1,600 cr was generated from Hyderabad.
In 2013, nearly 84.86 lakh passports and other related documents were issued compared to 73.8 lakh in 2012 globally, registering a growth of 15 per cent.
Srikar Reddy said Hyderabad tops the list of RPOs in terms of the number of applications processed and services rendered at 6.37 lakh and 6.3 lakh, respectively of total passport services in the country.
Visakhapatnam, with 11 days, tops the list of RPOs on time taken in police verification, he added.
A total of 7.84 lakh applications were received from all over AP and 7.76 lakh passports were issued. About 30 per cent of the total applications used to be in tatkal category two years back. Now, it has come down to 5 per cent. It is a phenomenal achievement and shows the efficiency of our services that most people do not go for tatkal anymore,” Reddy pointed out.
In 2013, Andhra Pradesh also featured at number four among the top 5 states in terms of number of passport applications received, and number 2 in terms of least time taken in police verification.
The ministry has also introduced online payment system in July 2013, and has led to noticeable improvement in the availability of appointments. mPassport Seva mobile app is also available for accessing information on smart phones.
e-Passports to be Introduced Soon
Rolling out the road ahead for passport services in the country, Muktesh K Pardeshi, the chief passport oOfficer, said that among the new initiatives a centralised bulk passport printing centre would come up in Delhi to assist RPOs and also fascimile signatures of the regional passport officer would be printed in passports in order to save time and effort. The new generation electronic passport, which aims to secure the data and curb the menace of fake passports, is likely to be introduced by next year, he said.The e-passports will replace the existing passport document with a plastic card embedded with an electronic chip containing all the details of the passport holder including bio-metric information, besides a Digital Signature Certificate of a passport officer, he explained.
Hand-held Devices for Constables
The trial for hand-held devices for police constables, enabling online police verification at citizens’ doorstep is presently on in West Godavari district and now it is contemplated to start it on a pilot basis under Cyberabad Police Commissionerate here and later to other parts. The all-India average number of days taken to complete police verification is 49 and about 37 pc of the PVs get completed within 21 days. AP has been doing the same in 17 days. ‘‘RPO would sent the details of the applicant to the user ID of the constables using the devices. The device integrated with the online system would help reducing the time phenomenally,” he said.
Referral site-http://www.newindianexpress.com/states/andhra_pradesh/Passport-Issuance-to-Cross-One-crore-Mark-Soon/2014/02/08/article2045100.ece#.UwNiFNIW0sI
Addressing newsmen at the regional passport office here on Friday along with regional passport officer Dr Srikar Reddy, he said that the mee-seva model implemented in AP, which allows people to fill their online applications without the intervention of an agent is likely to be implemented across the country.
Regarding the police verification model started in the state, which could phenomenally bring down the number of days and paperwork involved, he said, “AP has shown the way.” He also informed that about Rs 103 cr out of the total revenue of Rs 1,600 cr was generated from Hyderabad.
In 2013, nearly 84.86 lakh passports and other related documents were issued compared to 73.8 lakh in 2012 globally, registering a growth of 15 per cent.
Srikar Reddy said Hyderabad tops the list of RPOs in terms of the number of applications processed and services rendered at 6.37 lakh and 6.3 lakh, respectively of total passport services in the country.
Visakhapatnam, with 11 days, tops the list of RPOs on time taken in police verification, he added.
A total of 7.84 lakh applications were received from all over AP and 7.76 lakh passports were issued. About 30 per cent of the total applications used to be in tatkal category two years back. Now, it has come down to 5 per cent. It is a phenomenal achievement and shows the efficiency of our services that most people do not go for tatkal anymore,” Reddy pointed out.
In 2013, Andhra Pradesh also featured at number four among the top 5 states in terms of number of passport applications received, and number 2 in terms of least time taken in police verification.
The ministry has also introduced online payment system in July 2013, and has led to noticeable improvement in the availability of appointments. mPassport Seva mobile app is also available for accessing information on smart phones.
e-Passports to be Introduced Soon
Rolling out the road ahead for passport services in the country, Muktesh K Pardeshi, the chief passport oOfficer, said that among the new initiatives a centralised bulk passport printing centre would come up in Delhi to assist RPOs and also fascimile signatures of the regional passport officer would be printed in passports in order to save time and effort. The new generation electronic passport, which aims to secure the data and curb the menace of fake passports, is likely to be introduced by next year, he said.The e-passports will replace the existing passport document with a plastic card embedded with an electronic chip containing all the details of the passport holder including bio-metric information, besides a Digital Signature Certificate of a passport officer, he explained.
Hand-held Devices for Constables
The trial for hand-held devices for police constables, enabling online police verification at citizens’ doorstep is presently on in West Godavari district and now it is contemplated to start it on a pilot basis under Cyberabad Police Commissionerate here and later to other parts. The all-India average number of days taken to complete police verification is 49 and about 37 pc of the PVs get completed within 21 days. AP has been doing the same in 17 days. ‘‘RPO would sent the details of the applicant to the user ID of the constables using the devices. The device integrated with the online system would help reducing the time phenomenally,” he said.
Referral site-http://www.newindianexpress.com/states/andhra_pradesh/Passport-Issuance-to-Cross-One-crore-Mark-Soon/2014/02/08/article2045100.ece#.UwNiFNIW0sI
Saturday, 15 February 2014
Public key infrastructure
04:08
2 comments
A public-key infrastructure (PKI) is a set of software, hardware, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The third-party validation authority (VA) can provide this information on behalf of CA. The binding is established through the registration and issuance process, which, depending on the assurance level of the binding, may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA), which ensures that the public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.
Public-key cryptography is a cryptographic technique that enables users to securely communicate on an insecure public network, and reliably verify the identity of a user via digital signatures.
A PKI is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital signature certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed.
Certificate authorities
The primary role of the CA is to digitally sign and publish the public key bound to a given user. This is done using the CA's own private key, so that trust in the user key relies on one's trust in the validity of the CA's key. When the CA is a third party separate from the user and the system, then it is called the Registration Authority (RA), which may or may not be separate from the CA. The key-user binding is established, depending on the level of assurance the binding has, by software or under human supervision.
The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, public-key infrastructure (PKI) is itself often used as a synonym for a CA implementation.
Temporary certificates and single sign-on
This approach involves a server that acts as an online certificate authority within a single sign-on system. A single sign-on server will issue digital certificates into the client system, but never stores them. Users can execute programs, etc. with the temporary certificate. It is common to find this solution variety with X.509-based certificates.
Web of trust
An alternative approach to the problem of public authentication of public-key information is the web-of-trust scheme, which uses self-signed certificates and third party attestations of those certificates. The singular term "web of trust" does not imply the existence of a single web of trust, or common point of trust, but rather one of any number of potentially disjoint "webs of trust". Examples of implementations of this approach are PGP (Pretty Good Privacy) and GnuPG (an implementation of OpenPGP, the standardized specification of PGP). Because PGP and implementations allow the use of e-mail digital signatures for self-publication of public-key information, it is relatively easy to implement one's own web of trust.[citation needed]
One of the benefits of the web of trust, such as in PGP, is that it can interoperate with a PKI CA fully trusted by all parties in a domain (such as an internal CA in a company) that is willing to guarantee certificates, as a trusted introduce. Only if the "web of trust" is completely trusted, and because of the nature of a web of trust, trusting one certificate is granting trust to all the certificates in that web. A PKI is only as valuable as the standards and practices that control the issuance of certificates and including PGP or a personally instituted web of trust could significantly degrade the trustability of that enterprise's or domain's implementation of PKI.
The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0:
Simple public-key infrastructure
Another alternative, which does not deal with public authentication of public-key information, is the SPKI that grew out of three independent efforts to overcome the complexities of X.509 and PGP's web of trust. simple public-key infrastructure does not associate users with persons, since the key is what is trusted, rather than the person. simple public-key infrastructure does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in simple public-key infrastructure terminology, where authorization is integral to its design.
Apply online Digital Signature Certificate by DSM
In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The third-party validation authority (VA) can provide this information on behalf of CA. The binding is established through the registration and issuance process, which, depending on the assurance level of the binding, may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA), which ensures that the public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.
Public-key cryptography is a cryptographic technique that enables users to securely communicate on an insecure public network, and reliably verify the identity of a user via digital signatures.
A PKI is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital signature certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed.
- A public-key infrastructure (PKI) consists of:
- A certificate authority (CA) that both issues and verifies the digital certificates
- A registration authority which verifies the identity of users requesting information from the CA
- A central directory—i.e., a secure location in which to store and index keys
- A certificate management system
- A certificate policy
Methods of certification
Broadly speaking, there are three approaches to getting this trust: certificate authorities (CAs), web of trust (WoT), and simple public-key infrastructure (SPKI).Certificate authorities
The primary role of the CA is to digitally sign and publish the public key bound to a given user. This is done using the CA's own private key, so that trust in the user key relies on one's trust in the validity of the CA's key. When the CA is a third party separate from the user and the system, then it is called the Registration Authority (RA), which may or may not be separate from the CA. The key-user binding is established, depending on the level of assurance the binding has, by software or under human supervision.
The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, public-key infrastructure (PKI) is itself often used as a synonym for a CA implementation.
Temporary certificates and single sign-on
This approach involves a server that acts as an online certificate authority within a single sign-on system. A single sign-on server will issue digital certificates into the client system, but never stores them. Users can execute programs, etc. with the temporary certificate. It is common to find this solution variety with X.509-based certificates.
Web of trust
An alternative approach to the problem of public authentication of public-key information is the web-of-trust scheme, which uses self-signed certificates and third party attestations of those certificates. The singular term "web of trust" does not imply the existence of a single web of trust, or common point of trust, but rather one of any number of potentially disjoint "webs of trust". Examples of implementations of this approach are PGP (Pretty Good Privacy) and GnuPG (an implementation of OpenPGP, the standardized specification of PGP). Because PGP and implementations allow the use of e-mail digital signatures for self-publication of public-key information, it is relatively easy to implement one's own web of trust.[citation needed]
One of the benefits of the web of trust, such as in PGP, is that it can interoperate with a PKI CA fully trusted by all parties in a domain (such as an internal CA in a company) that is willing to guarantee certificates, as a trusted introduce. Only if the "web of trust" is completely trusted, and because of the nature of a web of trust, trusting one certificate is granting trust to all the certificates in that web. A PKI is only as valuable as the standards and practices that control the issuance of certificates and including PGP or a personally instituted web of trust could significantly degrade the trustability of that enterprise's or domain's implementation of PKI.
The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0:
As time goes on, you will accumulate keys from other people that you
may want to designate as trusted introduces. Everyone else will each choose
their own trusted introduces. And everyone will gradually accumulate and
distribute with their key a collection of certifying signatures from other
people, with the expectation that anyone receiving it will trust at least one
or two of the signatures. This will cause the emergence of a decentralized
fault-tolerant web of confidence for all public keys.
|
Simple public-key infrastructure
Another alternative, which does not deal with public authentication of public-key information, is the SPKI that grew out of three independent efforts to overcome the complexities of X.509 and PGP's web of trust. simple public-key infrastructure does not associate users with persons, since the key is what is trusted, rather than the person. simple public-key infrastructure does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in simple public-key infrastructure terminology, where authorization is integral to its design.
Apply online Digital Signature Certificate by DSM
How to sign a PDF using Digital signature
02:35
1 comment
September is usually a busy season for most of the professionals as it is the Tax Audit time. The clients usually come at peak time & we have to get their books audited & that too in time.
CBDT has made many changes in the way Tax Audit has to furnished by the Chartered Accountant. The Important change being that the Audit report has to submit Electronically. The other thing is we now have to upload the Balance Sheet & Profit & Loss A/c in PDF Format. These have to be attested by the Auditor & the client.
Though there is no clear instructions from the tax department that whether both Auditor & client has to sign the Balance sheet & Profit & Loss A/c, it is usually done by most of the Chartered Accountants.
Now here comes the difficulty. The Client usually approaches at peak hours & the CA does not have the time & patience to get them printed & signed.
The Shortcut way to do is to make the PDF of the Financial statements & attach the Digital signature which is in .pfx format & upload it to the income tax site. This makes the work a lot simpler as the statements are signed both by the Client & the CA.
Now to get the PDF signed using Digital signature you need to attach it to the PDF file. For this, you need a program called PDF signer.
This is a pretty cool program that allows you to attach your .pfx file to the PDF. You can attach .pfx file to a single PDF or a folder as a whole.
It also allows you to place the signature at Right, Top, Below if you want to make it visible.
Download Digital Signature Application Form
Dgital Signature Certificate Provider in Delhi
Digital Signature Mart is a Licensed Registration Authority of (n) Code Solutions to provide all type of Digital Signature Certificate Class-2, Class-3 and DGFT Digital Signature Certificates since 2006 on Pan India Basis. Digital Signature Mart is providing signing DGFT Digital Signature Certificates with FIPS Certified cryptographic USB Tokens for e-filing with DGFT Department with 1 year and 2 years validity. Digital Signature Mart is providing the Class-2A/2B signing and encryption Digital Signature Certificates with FIPS Certified cryptographic USB Tokens for e-Filing of Income Tax, Vat, Service Tax, TDS Return, MCA21/ ROC, PF Claims with 1 year and 2 years validity. Digital Signature Mart is providing Class-3A/ 3B Signing and Encryption Digital Signature Certificates with FIPS Certified Cryptographic USB Tokens for e-Tendering, e-Auction, e-Procurement, e-Bidding, IRCTC Agents, Trademark, Copy Right and Patent right e-filing with 1 year and 2 years validity.
CBDT has made many changes in the way Tax Audit has to furnished by the Chartered Accountant. The Important change being that the Audit report has to submit Electronically. The other thing is we now have to upload the Balance Sheet & Profit & Loss A/c in PDF Format. These have to be attested by the Auditor & the client.
Though there is no clear instructions from the tax department that whether both Auditor & client has to sign the Balance sheet & Profit & Loss A/c, it is usually done by most of the Chartered Accountants.
Now here comes the difficulty. The Client usually approaches at peak hours & the CA does not have the time & patience to get them printed & signed.
The Shortcut way to do is to make the PDF of the Financial statements & attach the Digital signature which is in .pfx format & upload it to the income tax site. This makes the work a lot simpler as the statements are signed both by the Client & the CA.
Now to get the PDF signed using Digital signature you need to attach it to the PDF file. For this, you need a program called PDF signer.
This is a pretty cool program that allows you to attach your .pfx file to the PDF. You can attach .pfx file to a single PDF or a folder as a whole.
It also allows you to place the signature at Right, Top, Below if you want to make it visible.
Download Digital Signature Application Form
Dgital Signature Certificate Provider in Delhi
Digital Signature Mart is a Licensed Registration Authority of (n) Code Solutions to provide all type of Digital Signature Certificate Class-2, Class-3 and DGFT Digital Signature Certificates since 2006 on Pan India Basis. Digital Signature Mart is providing signing DGFT Digital Signature Certificates with FIPS Certified cryptographic USB Tokens for e-filing with DGFT Department with 1 year and 2 years validity. Digital Signature Mart is providing the Class-2A/2B signing and encryption Digital Signature Certificates with FIPS Certified cryptographic USB Tokens for e-Filing of Income Tax, Vat, Service Tax, TDS Return, MCA21/ ROC, PF Claims with 1 year and 2 years validity. Digital Signature Mart is providing Class-3A/ 3B Signing and Encryption Digital Signature Certificates with FIPS Certified Cryptographic USB Tokens for e-Tendering, e-Auction, e-Procurement, e-Bidding, IRCTC Agents, Trademark, Copy Right and Patent right e-filing with 1 year and 2 years validity.
Tuesday, 28 January 2014
What Is Digital Signature?
05:49
No comments
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
Definition
A digital signature scheme typically consists of three algorithms:
A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.
A signing algorithm that, given a message and a private key, produces a signature.
A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message’s claim to authenticity.
Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party without knowing that party’s private key.
History
In 1976, Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed. Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm, which could be used to produce primitive digital signatures (although only as a proof-of-concept – “plain” RSA signatures are not secure). The first widely marketed software package to offer digital signature was Lotus Notes 1.0, released in 1989, which used the RSA algorithm.[citation needed]
Other digital signature schemes were soon developed after RSA, the earliest being Lamport signatures, Merkle signatures (also known as “Merkle trees” or simply “Hash trees”), and Rabin signatures.
In 1988, Shafi Goldwasser, Silvio Micali, and Ronald Rivest became the first to rigorously define the security requirements of digital signature schemes. They described a hierarchy of attack models for signature schemes, and also present the GMR signature scheme, the first that can be proven to prevent even an existential forgery against a chosen message attack.
How they work
To create RSA signature keys, generate an RSA key pair containing a modulus N that is the product of two large primes, along with integers e and d such that e d ≡ 1 (mod φ(N)), where φ is the Euler phi-function. The signer’s public key consists of N and e, and the signer’s secret key contains d.
To sign a message m, the signer computes σ ≡ md (mod N). To verify, the receiver checks that σe ≡ m (mod N).
As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result. This approach can be proven secure in the so-called random oracle model[clarification needed]. Most early signature schemes were of a similar type: they involve the use of a trapdoor permutation, such as the RSA function, or in the case of the Rabin signature scheme, computing square modulo composite n. A trapdoor permutation family is a family of permutations, specified by a parameter, that is easy to compute in the forward direction, but is difficult to compute in the reverse direction without already knowing the private key. However, for every parameter there is a “trapdoor” (private key) which when known, easily decrypts the message. Trapdoor permutations can be viewed as public-key encryption systems, where the parameter is the public key and the trapdoor is the secret key, and where encrypting corresponds to computing the forward direction of the permutation, while decrypting corresponds to the reverse direction. Trapdoor permutations can also be viewed as digital signature schemes, where computing the reverse direction with the secret key is thought of as signing, and computing the forward direction is done to verify signatures. Because of this correspondence, digital signatures are often described as based on public-key cryptosystems, where signing is equivalent to decryption and verification is equivalent to encryption, but this is not the only way digital signatures are computed.
Used directly, this type of signature scheme is vulnerable to a key-only existential forgery attack. To create a forgery, the attacker picks a random signature σ and uses the verification procedure to determine the message m corresponding to that signature. In practice, however, this type of signature is not used directly, but rather, the message to be signed is first hashed to produce a short digest that is then signed. This forgery attack, then, only produces the hash function output that corresponds to σ, but not a message that leads to that value, which does not lead to an attack. In the random oracle model, this hash-then-sign form of signature is existentially unforgeable, even against a chosen-message attack.
There are several reasons to sign such a hash (or message digest) instead of the whole document.
For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice.
For compatibility: Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format.
For integrity: Without the hash function, the text “to be signed” may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order.
Notions of security
In their foundational paper, Goldwasser, Micali, and Rivest lay out a hierarchy of attack models against digital signatures:
In a key-only attack, the attacker is only given the public verification key.
In a known message attack, the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker.
In an adaptive chosen message attack, the attacker first learns signatures on arbitrary messages of the attacker’s choice.
Definition
A digital signature scheme typically consists of three algorithms:
A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.
A signing algorithm that, given a message and a private key, produces a signature.
A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message’s claim to authenticity.
Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party without knowing that party’s private key.
History
In 1976, Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed. Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm, which could be used to produce primitive digital signatures (although only as a proof-of-concept – “plain” RSA signatures are not secure). The first widely marketed software package to offer digital signature was Lotus Notes 1.0, released in 1989, which used the RSA algorithm.[citation needed]
Other digital signature schemes were soon developed after RSA, the earliest being Lamport signatures, Merkle signatures (also known as “Merkle trees” or simply “Hash trees”), and Rabin signatures.
In 1988, Shafi Goldwasser, Silvio Micali, and Ronald Rivest became the first to rigorously define the security requirements of digital signature schemes. They described a hierarchy of attack models for signature schemes, and also present the GMR signature scheme, the first that can be proven to prevent even an existential forgery against a chosen message attack.
How they work
To create RSA signature keys, generate an RSA key pair containing a modulus N that is the product of two large primes, along with integers e and d such that e d ≡ 1 (mod φ(N)), where φ is the Euler phi-function. The signer’s public key consists of N and e, and the signer’s secret key contains d.
To sign a message m, the signer computes σ ≡ md (mod N). To verify, the receiver checks that σe ≡ m (mod N).
As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result. This approach can be proven secure in the so-called random oracle model[clarification needed]. Most early signature schemes were of a similar type: they involve the use of a trapdoor permutation, such as the RSA function, or in the case of the Rabin signature scheme, computing square modulo composite n. A trapdoor permutation family is a family of permutations, specified by a parameter, that is easy to compute in the forward direction, but is difficult to compute in the reverse direction without already knowing the private key. However, for every parameter there is a “trapdoor” (private key) which when known, easily decrypts the message. Trapdoor permutations can be viewed as public-key encryption systems, where the parameter is the public key and the trapdoor is the secret key, and where encrypting corresponds to computing the forward direction of the permutation, while decrypting corresponds to the reverse direction. Trapdoor permutations can also be viewed as digital signature schemes, where computing the reverse direction with the secret key is thought of as signing, and computing the forward direction is done to verify signatures. Because of this correspondence, digital signatures are often described as based on public-key cryptosystems, where signing is equivalent to decryption and verification is equivalent to encryption, but this is not the only way digital signatures are computed.
Used directly, this type of signature scheme is vulnerable to a key-only existential forgery attack. To create a forgery, the attacker picks a random signature σ and uses the verification procedure to determine the message m corresponding to that signature. In practice, however, this type of signature is not used directly, but rather, the message to be signed is first hashed to produce a short digest that is then signed. This forgery attack, then, only produces the hash function output that corresponds to σ, but not a message that leads to that value, which does not lead to an attack. In the random oracle model, this hash-then-sign form of signature is existentially unforgeable, even against a chosen-message attack.
There are several reasons to sign such a hash (or message digest) instead of the whole document.
For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice.
For compatibility: Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format.
For integrity: Without the hash function, the text “to be signed” may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order.
Notions of security
In their foundational paper, Goldwasser, Micali, and Rivest lay out a hierarchy of attack models against digital signatures:
In a key-only attack, the attacker is only given the public verification key.
In a known message attack, the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker.
In an adaptive chosen message attack, the attacker first learns signatures on arbitrary messages of the attacker’s choice.
They also describe a hierarchy of attack results:
A total break results in the recovery of the signing key.A universal forgery attack results in the ability to forge signatures for any message.
A selective forgery attack results in a signature on a message of the adversary’s choice.
An existential forgery merely results in some valid message/signature pair not already known to the adversary.
The strongest notion of security, therefore, is security against existential forgery under an adaptive chosen message attack.
Applications of digital signatures
As organizations move away from paper documents with ink signatures or authenticity stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. Universities including Penn State, University of Chicago, and Stanford are publishing electronic student transcripts with digital signatures.
Below are some common reasons for applying a digital signature to communications:
Authentication
Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank’s branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.
Integrity
In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message after signature invalidates the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
Non-repudiation
Non-repudiation, or more specifically non-repudiation of origin, is an important aspect of digital signatures. By this property, an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature.
Note that these authentication, non-repudiation etc. properties rely on the secret key not having been revoked prior to its usage. Public revocation of a key-pair is a required ability, else leaked secret keys would continue to implicate the claimed owner of the key-pair. Checking revocation status requires an “online” check, e.g. checking a “Certificate Revocation List” or via the “Online Certificate Status Protocol”. Very roughly this is analogous to a vendor who receives credit-cards first checking online with the credit-card issuer to find if a given card has been reported lost or stolen. Of course, with stolen key pairs, the theft is often discovered only after the secret key’s use, e.g., to sign a bogus certificate for espionage purposes.
Explanation
Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, Brazil, and members of the European Union, electronic signatures have legal significance.
Digital signatures employ a type of asymmetric cryptography. For messages sent through a non secure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects, but properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes, in the sense used here, are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid. Digitally signed messages may be anything representable as a bit string: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol.
Additional security precautions
Putting the private key on a smart card
All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can be stored on a user’s computer, and protected by a local password, but this has two disadvantages:
- the user can only sign documents on that particular computer
- the security of the private key depends entirely on the security of the computer
A more secure alternative is to store the private key on a smart card. Many smart cards are designed to be tamper-resistant (although some designs have been broken, notably by Ross Anderson and his students). In a typical digital signature implementation, the hash calculated from the document is sent to the smart card, whose CPU encrypts the hash using the stored private key of the user, and then returns the encrypted hash. Typically, a user must activate his smart card by entering a personal identification number or PIN code (thus providing two-factor authentication). It can be arranged that the private key never leaves the smart card, although this is not always implemented. If the smart card is stolen, the thief will still need the PIN code to generate a digital signature. This reduces the security of the scheme to that of the PIN system, although it still requires an attacker to possess the card. A mitigating factor is that private keys, if generated and stored on smart cards, are usually regarded as difficult to copy, and are assumed to exist in exactly one copy. Thus, the loss of the smart card may be detected by the owner and the corresponding certificate can be immediately revoked. Private keys that are protected by software only may be easier to copy, and such compromises are far more difficult to detect.
Using smart card readers with a separate keyboard
Entering a PIN code to activate the smart card commonly requires a numeric keypad. Some card readers have their own numeric keypad. This is safer than using a card reader integrated into a PC, and then entering the PIN using that computer’s keyboard. Readers with a numeric keypad are meant to circumvent the eavesdropping threat where the computer might be running a keystroke logger, potentially compromising the PIN code. Specialized card readers are also less vulnerable to tampering with their software or hardware and are often EAL3 certified.
Other smart card designs
Smart card design is an active field, and there are smart card schemes which are intended to avoid these particular problems, though so far with little security proofs.
Using digital signatures only with trusted applications
One of the main differences between a digital signature and a written signature is that the user does not “see” what he signs. The user application presents a hash code to be encrypted by the digital signing algorithm using the private key. An attacker who gains control of the user’s PC can possibly replace the user application with a foreign substitute, in effect replacing the user’s own communications with those of the attacker. This could allow a malicious application to trick a user into signing any document by displaying the user’s original on-screen, but presenting the attacker’s own documents to the signing application.
To protect against this scenario, an authentication system can be set up between the user’s application (word processor, email client, etc.) and the signing application. The general idea is to provide some means for both the user application and signing application to verify each other’s integrity. For example, the signing application may require all requests to come from digitally signed binaries.
WYSIWYS
Technically speaking, a digital signature applies to a string of bits, whereas humans and applications “believe” that they sign the semantic interpretation of those bits. In order to be semantically interpreted, the bit string must be transformed into a form that is meaningful for humans and applications, and this is done through a combination of hardware and software-based processes on a computer system. The problem is that the semantic interpretation of bits can change as a function of the processes used to transform the bits into semantic content. It is relatively easy to change the interpretation of a digital document by implementing changes in the computer system where the document is being processed. From a semantic perspective, this creates uncertainty about what exactly has been signed. WYSIWYS (What You See Is What You Sign) means that the semantic interpretation of a signed message cannot be changed. In particular, this also means that a message cannot contain hidden information that the signer is unaware of, and that can be revealed after the signature has been applied. WYSIWYS is a necessary requirement for the validity of digital signatures, but this requirement is difficult to guarantee because of the increasing complexity of modern computer systems.
Digital signatures vs. ink on paper signatures
An ink signature could be replicated from one document to another by copying the image manually or digitally, but to have credible signature copies that can resist some scrutiny is a significant manual or technical skill, and to produce ink signature copies that resist professional scrutiny is very difficult.
Digital signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document. Paper contracts sometimes have the ink signature block on the last page, and the previous pages may be replaced after a signature is applied. Digital signatures can be applied to an entire document, such that the digital signature on the last page will indicate tampering if any data on any of the pages have been altered, but this can also be achieved by signing with ink and numbering all pages of the contract.
Additionally, most digital certificates provided by certificate authorities to end users to sign documents can be obtained by at most gaining access to a victim’s email inbox.
Some digital signature algorithms
- RSA-based signature schemes, such as RSA-PSS
- DSA and its elliptic curve variant ECDSA
- Gamal signature scheme as the predecessor to DSA, and variants Schnorr signature and Pointcheval–Stern signature
- algorithm
- Rabin signature algorithm
- Pairing-based schemes such as BLS
- Undeniable signatures
- Aggregate signature – a signature scheme that supports aggregation: Given n signatures on n messages from n users, it is
- possible to aggregate all these signatures into a single signature whose size is constant in the number of users. This single
- a signature will convince the verifier that the n users did indeed sign the n original messages.
- Signatures with efficient protocols – are signature schemes that facilitate efficient cryptographic protocols such as zero-knowledge proofs or secure computation.
The current state of use – legal and practical
All digital signature schemes share the following basic prerequisites regardless of cryptographic theory or legal provision:
- Quality algorithms- Some public-key algorithms are known to be insecure, practical attacks against them having been discovered.
- Quality implementations- An implementation of a good algorithm (or protocol) with a mistake(s) will not work.
- The private key must remain private- If the private key becomes known to any other party, that party can produce perfect digital signatures of anything whatsoever.
- The public key owner must be verifiable- A public key associated with Bob actually came from Bob. This is commonly done using a public key infrastructure (PKI) and the public key\leftrightarrowuser association is attested by the operator of the PKI (called a certificate authority). For ‘open’ PKIs in which anyone can request such an attestation (universally embodied in a cryptographically protected identity certificate), the possibility of mistaken attestation is nontrivial. Commercial PKI operators have suffered several publicly known problems. Such mistakes could lead to falsely signed and thus wrongly attributed documents. ‘Closed’ PKI systems are more expensive, but less easily subverted in this way.
- Users (and their software) must carry out the signature protocol properly.
Only if all of these conditions are met will a digital signature actually be any evidence of who sent the message, and therefore of their assent to its contents. Legal enactment cannot change this reality of the existing engineering possibilities, though some such have not reflected this actuality.
Legislatures, being importuned by businesses expecting to profit from operating a PKI, or by the technological avant-garde advocating new solutions to old problems, have enacted statutes and/or regulations in many jurisdictions authorizing, endorsing, encouraging, or permitting digital signatures and providing for (or limiting) their legal effect. The first appears to have been in Utah in the United States, followed closely by the states Massachusetts and California. Other countries have also passed statutes or issued regulations in this area as well and the UN has had an active model law project for some time. These enactments (or proposed enactments) vary from place to place, have typically embodied expectations at variance (optimistically or pessimistically) with the state of the underlying cryptographic engineering, and have had the net effect of confusing potential users and specifiers, nearly all of whom are not cryptographically knowledgeable. Adoption of technical standards for digital signatures has lagged behind much of the legislation, delaying a more or less unified engineering position on interoperability, algorithm choice, key lengths, and so on what the engineering is attempting to provide.
Industry standards
Some industries have established common interoperability standards for the use of digital signatures between members of the industry and with regulators. These include the Automotive Network Exchange for the automobile industry and the SAFE-BioPharma Association for the healthcare industry.
Using separate key pairs for signing and encryption
In several countries, a digital signature has a status somewhat like that of a traditional pen and paper signature, like in the EU digital signature legislation. Generally, these provisions mean that anything digitally signed legally binds the signer of the document to the terms therein. For that reason, it is often thought best to use separate key pairs for encrypting and signing. Using the encryption key pair, a person can engage in an encrypted conversation (e.g., regarding a real estate transaction), but the encryption does not legally sign every message he sends. Only when both parties come to an agreement do they sign a contract with their signing keys, and only then are they legally bound by the terms of a specific document. After signing, the document can be sent over the encrypted link. If a signing key is lost or compromised, it can be revoked to mitigate any future transactions. If an encryption key is lost, a backup or key escrow should be utilized to continue viewing encrypted content. Signing keys should never be backed up or es crowed.
Apply Online Digital Signature Certificate Class 3 by Digital Signature Mart provider in India
Subscribe to:
Posts (Atom)