Digital Signatures and Electronic Signatures: Project Report On
Digital Signatures and Electronic Signatures: Project Report On
Project Report on
SUBMITTED TO:
SUBMITTED BY:
Shreya Jindal
157/13
B.Com. LL.B.(Hons)
10th Semester
Section C
Information Technology Laws
Digital Signatures and Electronic Signatures 2
Contents
Acknowledgement...........................................................................................................................3
Chapter 1
Introduction......................................................................................................................................4
Chapter 2
Digital Signatures............................................................................................................................5
Parties to e-record....................................................................................................................7
2.7. Authentication by the use of asymmetric crypto system and hash function- Section 3(2)
10
2.7.1. Cryptology...............................................................................................................10
2.9.3. The Private Key and the Public Key are unique- Section 3(4)................................15
Information Technology Laws
Digital Signatures and Electronic Signatures 3
Chapter 3
Electronic Signatures.....................................................................................................................16
Chapter 4
Bibliography..................................................................................................................................22
Acknowledgement
This project would not have been possible without the help and support of my parents and
teacher. I would like to thank them for their efforts and guidance, which has thoroughly helped in
shaping up this project. I sincerely acknowledge their words of wisdom and advice, which are
the pearls that have helped string this project together.
It has been very rightly said, “To err is human”. Though I have put in my sincere efforts in
thoroughly researching and editing this project report, I apologize for any mistakes that may
have crept in.
Shreya Jindal
157/13
Introduction
1.1. Why Digital Signatures and Electronic Signatures?
For achieving the requirements of electronic records or message, there came the concept of
digital and electronic signatures. Electronic Signature is a new concept and was introduced at the
international level by the Model law of Electronic Signature, 2001. Subsequently, the
information technology act was amended by the Information Technology (Amendment) Act
2008 to incorporate electronic signatures.
Identification is a fundamental legal requisite to decide the liability of a person for his action and
transaction. In transactions, identification technology is essential to identify the sender of the
message. In physical world, taking formal evidence of identity is a cumbersome process and
there are comparatively few transactions where identification is required as a standard procedure.
However, in e-transaction, the process is different. The identification technology associated with
Electronic/ Digital Signature may be technically very sophisticated, but practically it is simple in
use. In e-transaction, recipient of e-message is always required to have identification of the
sender, though such identification is not always required in documentary transactions.1
1
Dr. Jyoti Ratan, Cyber Laws and Information Technology, Bharat Law House Pvt. Ltd., New Delhi, 5 th ed. 2015, at
105.
2
Id. at 107
Information Technology Laws
Digital Signatures and Electronic Signatures 6
Digital Signatures
Digital Signature is defined as a short unit of data that bears a mathematical relationship to the
data (electronic record or message) in the documents content and provides assurance to the
recipient that the data is authentic.3
It can be defined as the process that authenticates both the origin and contents of the message in
a manner that is provable to third party. However, under Section 2(1)(p) of the Information
Technology Act, 2000, “digital signature” means authentication of any electronic record by a
subscriber by means of an electronic method or procedure in accordance with the provisions of
Section 3.4
Basically, digital signature is a security method of binding the identity of the signer or signatory
with electronic record or message. This method uses a public key crypto system commonly
known as asymmetric crypto system to generate digital signature.5
The idea was to adopt a technology that makes communications or transactions legally binding.
In order to be called legally binding, all electronic communications or transactions must meet the
fundamental requirements:
1. Authenticity of sender to enable the recipient to determine who really sent the message.
3
Ibid
4
Ibid
5
Ibid
6
Vakul Sharma, Information Technology Law and Practice, Universal Law Publishing Co., 2nd ed. 2008, at 29.
Information Technology Laws
Digital Signatures and Electronic Signatures 7
2. Message’s integrity, the recipient must be able to determine whether or not the message
received has been modified en route or is incomplete, and
3. Non repudiation, the ability to ensure that the sender cannot falsely deny sending the
message, nor falsely deny the contents of the message.7
It led to the acceptance of cryptography, a data encryption technique, which provided just that
kind of message protection. Based on the nature and number of keys cryptography has evolved
into two types:
A public key is meant for public consumption and private key is to be kept confidential. The
owner of the key pair must guard his private key closely, as sender authenticity and non
repudiation are based on the signer having sole access to his private key. In an asymmetric
crypto system, a private key is mathematically related to public key and it is computationally
impossible to calculate one key from another. Hence, private key cannot be compromised
through knowledge of its associated public key. Although many people know the public key of a
given signer and use it to verify that signer’s signature, they cannot discover that signer’s private
key and use it to forge digital signatures. This is referred to as the principle of “irreversibility”.9
Digital signatures are based on asymmetric or public key cryptography and are capable of
fulfilling the demand of burgeoning e-commerce not only by providing the message
authentication, integrity and non-repudiation function, but also making it highly scalable.
Another important feature is the involvement of a trusted third party, Certifying Authority, to
issue digital signature certificate.10
7
Ibid
8
Ibid
9
Ibid
10
Id. at 30
Information Technology Laws
Digital Signatures and Electronic Signatures 8
A hash function is used both in creating and verifying a digital signature. A hash function is an
algorithm which creates a digital representation or “fingerprint” in the form of a “hash value” or
“hash result” of a standard length which is usually much smaller than the message but
nevertheless substantially unique to it. Any change to the message invariably produces a
different hash result when the same hash function is used. Hash functions, therefore, provide
robust evidentiary correlation to the original message content, by giving assurance that there has
been no modification of the message since it was digitally signed.12
Parties to e-record
i. Originator- Section 2(1)(za)
“Originator” means a person who sends, generates, stores or transmits any electronic
message or causes any electronic message to be sent, generated, stored or transmitted
to any other person but does not include an intermediary.
11
Ibid
12
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 9
i. Confidentiality
It means to make sure that the message is kept confidential or secret so that only the
intended person must receive it.
ii. Digital Integrity
It is defined as a property whereby digital data has not been altered in an
unauthorized manner since the time it was created, transmitted or stored by an
unauthorised source.
iii. Authentication
Licence
DSC/ESC
Subscriber
Affixes DS/ES to
electronic record
Relying Party
Verification of DS/ES
PKI PROCESS
13
Supra 1 at 105
Information Technology Laws
Digital Signatures and Electronic Signatures 11
“Asymmetric Crypto System” according to Section 2(1)(f) means a system of a secure key pair
consisting of a private key for creating a digital signature and a public key to verify the digital
signature.
It is important to note that technology or process which is used in DS for integrity, secrecy and
non repudiation to electronic record or message is cryptology. Therefore, it is pertinent to know
what cryptology is before understanding Digital Signatures.15
2.7.1. Cryptology
It is the art or science of encrypting or encoding the meaningful data into meaningless data and
decoding it again at the receiver’s end to transform it back into meaningful data, making use of a
parameterized function.16
Cryptography
Cryptoanalysis
Cryptography
DS is created and verified by using cryptography. It is the science or art of secret writing i.e.
keeping information secret. Historically, cryptography has been used to hide information from
access by unauthorized interception. However in the modern society, it is also used to prevent
unauthorized access to any electronic record in digital medium.17
14
Id at 108
15
Ibid
16
Id at 109
17
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 12
Encryption
It is the process of converting legible form of text commonly known as plain text to illegible
form generally known as cipher text. However for encryption, a secret key is used. When
electronic record is sent by the subscriber he will use his private key to convert the electronic
record into illegible form so that if should not be misused before it is received by the recipient.18
Decryption
It is the process of converting illegible form of text (cipher text) to legible form (plain text).
However, for decryption a key is used commonly known as public key. This process is carried on
by the receiver of the e-record.19
18
Ibid
19
Id at 110
20
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 13
Digital Signature is the data which is attached at the end of electronic record or message and it
authenticates such message. Here asymmetric cryptology (a key pair) is used for encryption and
decryption.22
result every time the algorithm is executed with the same electronic record as its input making it
computationally infeasible:
a) To derive or reconstruct the original electronic record from the hash result produced by
the algorithm
b) That two electronic records can produce the same hash result using the algorithm.23
Step 2: A hash function in the signer’s software computes a hash result (message digest or digital
fingerprint) unique to the message.
Step 3: The signer’s software then transforms (encrypts) the hash result into a digital signature
using the signer’s private key. The resulting digital signature is, thus, unique to both the message
and the private key used to create it.
Step 4: The digital signature (a digitally signed hash result of the message) is attached to its
message and stored or transmitted with its message. Since a digital signature is unique to its
message, it is useful if it maintains a reasonable association with its message. Signer sends both
digital signature and the message to the recipient.24
Message
a) The initial electronic record was affixed with the digital signature by the use of private
key corresponding to the public key of the subscriber
b) The initial electronic record is retained intact or has been altered since such electronic
record was so affixed with the digital signature.25
1. To verify whether signer’s private key was used to create digital signature; and
2. Whether newly created hash result matches original hash result which was recovered
from digital signature during verification process.26
Step II: Recipient applies signer’s public key to the digital signature and recovers hash result
(Hash value or message digest or digital fingerprint) from the digital signature.
Step III: Recipient would apply same hash function to message (sent by the signer) as applied by
the signer to create digital signature and he would recover the hash result (hash value or message
digest or digital fingerprint of the message).
25
Supra 1 at 113
26
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 16
Step IV: Compare the hash results recovered in Step II and Step III. If hash results recovered in
Step II and Step III are identical, then it indicates that the message remains unchanged. However,
where these two results are not identical, it indicates that either signer’s private key was not used
to create digital signature or message was changed after signing. Therefore, in such situation
recipient can reject the message.27
2.9.3. The Private Key and the Public Key are unique- Section 3(4)
The private key and the public key are unique to the subscriber and constitute a functioning key
pair.
Key Pair, according to Section 2(1)(x) in an asymmetric crypto system, means a private key and
its mathematically related public key, which are so related that the public key can verify a digital
signature created by the private key.
27
Id at 114
28
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 17
Electronic Signatures
Electronic Signature is a wide term and it refers to various methods by which one can sign an
electronic record. ES is a technology neutral term and may take many forms and could be created
by different technologies.29
“Electronic Signature” means data in electronic form, affixed or logically associated with a data
message which may be used to identify the signatory’s approval of the information contained in
the data message.
The US Code defines an electronic signature for the purpose of US law as “an electronic sound,
symbol or process, attached to or logically associated with a contract or other record and
executed or adopted by a person with the intent to sign the record.”
In general, an electronic signature is defined as an electronic sound (e.g. audio files of a person’s
voice), symbol (e.g. a graphic representation of a person in JPEG file), or process (e.g. a
procedure that conveys assent), attached to or logically associated with a record, and executed or
adopted by a person with the intent to sign the record.30
According to Section 2(1)(ta) of the Information Technology Act, 2000, "electronic signature"
means authentication of any electronic record by a subscriber by means of the electronic
technique specified in the Second Schedule and includes digital signature.
It is significant to note that electronic signature is easy to implement, because even a typed name
can serve as electronic signature. Consequently, e-signatures are very problematic with regards
to maintaining integrity and security, as there is nothing to prevent one individual from typing
29
Id at 115
30
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 18
another individual’s name. Due to this reality, an electronic signature that does not incorporate
additional means of security is considered an insecure way of signing documents.31
(a) the signature creation data or the authentication data are, within the context in which they are
used, linked to the signatory or , as the case may be, the authenticator and of no other person;
(b) The signature creation data or the authentication data were, at the time of signing, under the
control of the signatory or, as the case may be, the authenticator and of no other person;
(c) Any alteration to the electronic signature made after affixing such signature is detectable
(d) Any alteration to the information made after its authentication by electronic signature is
detectable; and
31
Id at 116
Information Technology Laws
Digital Signatures and Electronic Signatures 19
i. The signature creation data at the time of affixation was under the exclusive control
of signatory and no other person; and
ii. The signature creation data stored and affixed in such exclusive manner as is
prescribed.
Further, signature creation means the private key of the subscriber.
take into account the commercial circumstances, nature of transaction and other related factors as
it considers appropriate.33
33
Ibid
Information Technology Laws
Digital Signatures and Electronic Signatures 21
signature.
2. It is technology neutral. It is technology specific.
Bibliography
BOOKS:
Dr. Jyoti Ratan, Cyber Laws and Information Technology, Bharat Law House Pvt. Ltd.,
New Delhi, 5th ed. 2015.
Vakul Sharma, Information Technology Law and Practice, Universal Law Publishing
Co., 2nd ed. 2008.
Dr. Farooq Ahmad, Cyber Law in India, New Era Law Publications, Delhi, 3rd ed. 2009.
WEBSITES:
http://www.signix.com/blog/bid/92791/The-Difference-Between-Digital-Signatures-and-
Electronic-Signatures
http://www.arx.com/learn/about-digital-signature/digital-signature-faq/
https://www.esignlive.com/blog/infographic-defining-difference-electronic-signatures-
digital-signatures/