Digital Signature
Digital Signature
• EXPIRE
Just like any other electronic device or technology it is based
and dependent on specific-type technology. In times of rapid
growth of sophisticated technology, many such products
have a short life.
• SOFTWARE
The sender and the recipient have to purchase the verification
software for the working of digital signature. It can be a
costly affair.
• COMPATIBILITY
The standards of digital signature are different and most of
them are contradictory to each other and create confusion
while sharing digitally signed documents.
DSC TOKEN
The term “Electronic
Signature” is defined under
section 2(1) (ta) of the IT Act as
“authentication of any electronic
record by a subscriber by means
of the electronic technique
specified in the Second Schedule
and includes digital signature”.
Second Schedule lays down the
ES or electronic authentication
technique and procedure.
It includes:
• Second Schedule lays down the Electronic Signature
or electronic authentication technique and
procedure. It includes:
• e-authentication technique using Aadhar or other e-
KYC services.
• E-authentication technique or procedure for
creating and accessing subscriber’s signature key is
facilitated by a trusted third party (TTP). Here, the
Certifying Authorities (“CA”) have to ensure the
subscriber identity verification, secure storage of the
key by the trusted third party (TTP) and subscribers’
sole authentication control to the signature key.
• SECTION 2(1)(d):- Affixing [electronic
signature] with its grammatical variations
and cognate expressions means adoption of
any methodology or procedure by a person
for the purpose of authenticating an
electronic record by means of digital
signature.
• SECTION 2(1)(tb):- Electronic Signature
Certificate means an Electronic Signature
Certificate issued under section 35 and
includes Digital Signature Certificate.
• SECTION 2(1)(zg):- Subscriber means a person in
whose name the electronic signature Certificate
is issued.
• The “subscriber” is the person whose name
appears in an Electronic Signature Certificate.
Therefore, a subscriber refers to a person who is
authorized by the Certifying Authority with
respect to the electronic signature. With
reference to a DSC, the subscriber is the person
who is authorized to use that key pair.
Section 3A of the I.T ACT
Act has been enacted keeping in mind these requirements under the Model Law
on E-Commerce and the need for maintaining technological neutrality:
(1) Notwithstanding anything contained in section 3, but subject to the
provisions of sub-section (2), a subscriber may authenticate any electronic
record by such electronic signature or electronic authentication technique
which—
(a) is considered reliable; and
(b) may be specified in the Second Schedule.
(2) For the purposes of this section any electronic signature or electronic
authentication technique shall be considered reliable if—
(a) the signature creation data or the authentication data are, within the context
in which they are used, linked to the signatory or, as the case may be, the
authenticator and to no other person;
(b) the signature creation data or the authentication data were, at the time of
signing, under the control of the signatory or, as the case may be, the
authenticator and of no other person
(c) any alteration to the electronic signature made after affixing such
signature is detectable;
(d) any alteration to the information made after its authentication by
electronic signature is detectable; and
(e) it fulfils such other conditions which may be prescribed.
(3) The Central Government may prescribe the procedure for the purpose
of ascertaining whether electronic signature is that of the person by
whom it is purported to have been affixed or authenticated.
(4) The Central Government may, by notification in the Official Gazette,
add to or omit any electronic signature or electronic authentication
technique and the procedure for affixing such signature from the
Second Schedule: Provided that no electronic signature or
authentication technique shall be specified in the Second Schedule
unless such signature or technique is reliable.
(5) Every notification issued under sub-section (4) shall be laid before
each House of Parliament.
Use of Electronic
Signatures
(i) Click - Wrap Agreements - 'I accept' button on websites.
(v) Signature Capture Devices - Devices such as tablets, signature pads, etc.
which capture handwritten signatures.
(i)The data used to create the signature, i.e., a private key in the case of
digital signature, was, at the time of affixing the signature, under the
exclusive control of the subscriber only.
(ii)The data used to create the signature was stored and affixed in
prescribed, exclusive manner.
• Public Key Infrastructure ("PKI") refers to the entire organizational structure that is
responsible for the establishment and maintenance of a reliable system of public key
cryptography. It has been defined under Schedule V of the CA Rules as follows:
• "The architecture, organization, techniques, practices, and procedures that collectively
support the implementation and operation of a certificate-based public key
cryptographic system. It includes a set of policies, processes, server platforms,
software and workstations, used for the purpose of administering Digital Signature
Certificate and keys.“
• The purpose of the PKI is to generate trust in the electronic environment. In the
absence of trust in the security of the transmission and the content of the
communication, e-commerce and e-governance will not find acceptance among
parties.
• The PKI is the medium that establishes the validity and legality of the digital
signatures being used by subscribers and of the bodies issuing digital signatures to
subscribers. It guarantees the authenticity of the electronic signatures, thereby
guaranteeing the enforceability of the electronic transaction for which the signature is
used. Its role in the electronic world is equivalent to that of a notary in the real world.
The legal basis for the PKI in India is found under Chapter VI of the IT Act, along
with various rules issued by the Government, such as the CA Rules and the IT
(Certifying Authority) Regulations, 2001. The hierarchy of the PKI which is
established hereby is as follows:
Certifying Authorities
Subscriber
The Controller has set up two subsidiary bodies, the Root Certifying Authority
of India and the National Repository of Digital Certificates.