INFORMATION/
TECHNOLOGY ACT,
2000
DR. SUCHITA BHOVAR
Information/ Technology Act, 2000
◦In 1996, the United Nations Commission on International Trade
Law (UNCITRAL) adopted the model law on electronic commerce
(E-commerce) to bring uniformity in the law in different countries.
◦Further, the General Assembly of the United Nations recommended
that all countries must consider this modern law before making
changes to their own laws.
◦India became the 12th country to enable cyber law after it passed
the Information Technology Act, 2000.
Information/ Technology Act, 2000
◦The Information Technology Act, 2000 provides legal recognition
to the transaction done via electronic exchange of data and other
electronic means of communication or electronic commerce
transactions.
◦This also involves the use of alternatives to a paper-based method
of communication and information storage to facilitate the
electronic filing of documents with the Government agencies.
Objectives of the Act
◦ Grant legal recognition to all transactions done via electronic
exchange of data or other electronic means of communication or e-
commerce, in place of the earlier paper-based method of
communication.
◦ Give legal recognition to digital signatures for the authentication of
any information or matters requiring legal authentication
◦ Facilitate the electronic filing of documents with Government
agencies and also departments
Objectives of the Act
◦ Facilitate the electronic storage of data
◦ Give legal sanction and also facilitate the electronic transfer of
funds between banks and financial institutions
◦ Grant legal recognition to bankers under the Evidence Act, 1891
and the Reserve Bank of India Act, 1934, for keeping the books of
accounts in electronic form.
DIGITAL SIGNATURE
◦ A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital
document, message or software.
◦ It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent
security.
◦ A digital signature is intended to solve the problem of tampering and impersonation in digital
communications.
◦ Digital signatures can provide evidence of origin, identity and status of electronic documents,
transactions or digital messages.
◦ Signers can also use them to acknowledge informed consent.
◦ In many countries, including the U.S., digital signatures are considered legally binding in the same way
as traditional handwritten document signatures.
DIGITAL SIGNATURE
◦Public key– Key which is known to everyone. Ex-
public key of A is 7, this information is known to
everyone.
◦Private key– Key which is only known to the
person who’s private key it is.
DIGITAL SIGNATURE
◦ Encryption – Process of converting electronic data into another form,
called ciphertext, which cannot be easily understood by anyone except the
authorized parties. This assures data security.
Decryption– Process of translating code to data.
• The message is encrypted at the sender’s side using various encryption
algorithms and decrypted at the receiver’s end with the help of the
decryption algorithms.
• When some message is to be kept secure like username, password, etc.,
encryption and decryption techniques are used to assure data security.
Types of Encryption
1.Symmetric Encryption– Data is encrypted using a key and the decryption is also done
using the same key.
2.Asymmetric Encryption-Asymmetric Cryptography is also known as public-key
cryptography.
◦ It uses public and private keys to encrypt and decrypt data.
◦ One key in the pair which can be shared with everyone is called the public key.
◦ The other key in the pair which is kept secret and is only known by the owner is called the
private key.
◦ Either of the keys can be used to encrypt a message; the opposite key from the one used
to encrypt the message is used for decryption.
DIGITAL SIGNATURE
◦ Authentication-Authentication is any process by which a system verifies the identity of
a user who wishes to access it.
Non- repudiation–Non-repudiation is a way to guarantee that the sender of a message
cannot later deny having sent the message and that the recipient cannot deny having
received the message.
Integrity– to ensure that the message was not altered during the transmission.
Message digest -The representation of text in the form of a single string of digits,
created using a formula called a one way hash function.
◦ Encrypting a message digest with a private key creates a digital signature which is an
electronic means of authentication..
Key Generation Algorithms
◦ Digital signature is electronic signatures, which assure that the
message was sent by a particular sender.
◦ While performing digital transactions authenticity and integrity
should be assured, otherwise, the data can be altered or someone
can also act as if he was the sender and expect a reply.
Signing Algorithms
◦ To create a digital signature, signing algorithms like email programs create a one-way hash of
the electronic data which is to be signed.
◦ The signing algorithm then encrypts the hash value using the private key (signature key).
◦ This encrypted hash along with other information like the hashing algorithm is the digital
signature.
◦ This digital signature is appended with the data and sent to the verifier.
◦ The reason for encrypting the hash instead of the entire message or document is that a hash
function converts any arbitrary input into a much shorter fixed-length value.
◦ This saves time as now instead of signing a long message a shorter hash value has to be
signed and moreover hashing is much faster than signing.
Signature Verification Algorithms
◦ Verifier receives Digital Signature along with the data.
◦ It then uses Verification algorithm to process on the digital signature and the
public key (verification key) and generates some value.
◦ It also applies the same hash function on the received data and generates a
hash value.
◦ Then the hash value and the output of the verification algorithm are compared.
◦ If they both are equal, then the digital signature is valid else it is invalid.
THANK YOU

information technology act111111111.pptx

  • 1.
  • 2.
    Information/ Technology Act,2000 ◦In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law on electronic commerce (E-commerce) to bring uniformity in the law in different countries. ◦Further, the General Assembly of the United Nations recommended that all countries must consider this modern law before making changes to their own laws. ◦India became the 12th country to enable cyber law after it passed the Information Technology Act, 2000.
  • 3.
    Information/ Technology Act,2000 ◦The Information Technology Act, 2000 provides legal recognition to the transaction done via electronic exchange of data and other electronic means of communication or electronic commerce transactions. ◦This also involves the use of alternatives to a paper-based method of communication and information storage to facilitate the electronic filing of documents with the Government agencies.
  • 4.
    Objectives of theAct ◦ Grant legal recognition to all transactions done via electronic exchange of data or other electronic means of communication or e- commerce, in place of the earlier paper-based method of communication. ◦ Give legal recognition to digital signatures for the authentication of any information or matters requiring legal authentication ◦ Facilitate the electronic filing of documents with Government agencies and also departments
  • 5.
    Objectives of theAct ◦ Facilitate the electronic storage of data ◦ Give legal sanction and also facilitate the electronic transfer of funds between banks and financial institutions ◦ Grant legal recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of India Act, 1934, for keeping the books of accounts in electronic form.
  • 6.
    DIGITAL SIGNATURE ◦ Adigital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software. ◦ It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. ◦ A digital signature is intended to solve the problem of tampering and impersonation in digital communications. ◦ Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. ◦ Signers can also use them to acknowledge informed consent. ◦ In many countries, including the U.S., digital signatures are considered legally binding in the same way as traditional handwritten document signatures.
  • 7.
    DIGITAL SIGNATURE ◦Public key–Key which is known to everyone. Ex- public key of A is 7, this information is known to everyone. ◦Private key– Key which is only known to the person who’s private key it is.
  • 8.
    DIGITAL SIGNATURE ◦ Encryption– Process of converting electronic data into another form, called ciphertext, which cannot be easily understood by anyone except the authorized parties. This assures data security. Decryption– Process of translating code to data. • The message is encrypted at the sender’s side using various encryption algorithms and decrypted at the receiver’s end with the help of the decryption algorithms. • When some message is to be kept secure like username, password, etc., encryption and decryption techniques are used to assure data security.
  • 9.
    Types of Encryption 1.SymmetricEncryption– Data is encrypted using a key and the decryption is also done using the same key. 2.Asymmetric Encryption-Asymmetric Cryptography is also known as public-key cryptography. ◦ It uses public and private keys to encrypt and decrypt data. ◦ One key in the pair which can be shared with everyone is called the public key. ◦ The other key in the pair which is kept secret and is only known by the owner is called the private key. ◦ Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
  • 10.
    DIGITAL SIGNATURE ◦ Authentication-Authenticationis any process by which a system verifies the identity of a user who wishes to access it. Non- repudiation–Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. Integrity– to ensure that the message was not altered during the transmission. Message digest -The representation of text in the form of a single string of digits, created using a formula called a one way hash function. ◦ Encrypting a message digest with a private key creates a digital signature which is an electronic means of authentication..
  • 11.
    Key Generation Algorithms ◦Digital signature is electronic signatures, which assure that the message was sent by a particular sender. ◦ While performing digital transactions authenticity and integrity should be assured, otherwise, the data can be altered or someone can also act as if he was the sender and expect a reply.
  • 12.
    Signing Algorithms ◦ Tocreate a digital signature, signing algorithms like email programs create a one-way hash of the electronic data which is to be signed. ◦ The signing algorithm then encrypts the hash value using the private key (signature key). ◦ This encrypted hash along with other information like the hashing algorithm is the digital signature. ◦ This digital signature is appended with the data and sent to the verifier. ◦ The reason for encrypting the hash instead of the entire message or document is that a hash function converts any arbitrary input into a much shorter fixed-length value. ◦ This saves time as now instead of signing a long message a shorter hash value has to be signed and moreover hashing is much faster than signing.
  • 13.
    Signature Verification Algorithms ◦Verifier receives Digital Signature along with the data. ◦ It then uses Verification algorithm to process on the digital signature and the public key (verification key) and generates some value. ◦ It also applies the same hash function on the received data and generates a hash value. ◦ Then the hash value and the output of the verification algorithm are compared. ◦ If they both are equal, then the digital signature is valid else it is invalid.
  • 15.