Unit-4 CLE
Unit-4 CLE
1. Electronic Signature:
Electronic Signature is a digital form of a wet link signature which is legally binding and
secure but it does not incorporate any coding or standards. It can be a symbol, image, process
attached to the message or document to recognize the identity and to give consent on it. When
we need to only verify the document we use electronic signature. The validation of electronic
signature is not performed by any trusted certificate authorities or trust service providers so it
is not usually authorized. Electronic signature is very easy to use than digital signature but it
is less secured and less authentic than digital signature.
2. Digital Signature:
Digital Signature is a secured signature which works with Electronic signature and relies on
Public key infrastructure means it comes with encryption standards. It can be visualized as an
electronic finger print which encrypts and identifies a person’s identity. When we need to
secure a document we use digital signature. The validation of digital signature is performed
by trusted certificate authorities or trust service providers so it is usually authorized. Digital
signature is preferred over electronic signature as it is more secured and more authentic than
the electronic signature.
1. Key Generation Algorithms: Digital signature is electronic signatures, which assure that
the message was sent by a particular sender. While performing digital transactions
authenticity and integrity should be assured, otherwise, the data can be altered or someone
can also act as if he was the sender and expect a reply.
2. Signing Algorithms: To create a digital signature, signing algorithms like email programs
create a one-way hash of the electronic data which is to be signed. The signing algorithm
then encrypts the hash value using the private key (signature key). This encrypted hash
along with other information like the hashing algorithm is the digital signature. This digital
signature is appended with the data and sent to the verifier. The reason for encrypting the
hash instead of the entire message or document is that a hash function converts any
arbitrary input into a much shorter fixed-length value. This saves time as now instead of
signing a long message a shorter hash value has to be signed and moreover hashing is
much faster than signing.
3. Signature Verification Algorithms: Verifier receives Digital Signature along with the
data. It then uses Verification algorithm to process on the digital signature and the public
key (verification key) and generates some value. It also applies the same hash function on
the received data and generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then the digital signature is
valid else it is invalid.
Concept of Digital Certificate
Digital certificate is issued by a trusted third party who proves sender’s identity to the receiver
and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the
identity of the certificate holder. The CA issues an encrypted digital certificate containing the
applicant’s public key and a variety of other identification information. Digital certificate is
used to attach public key with a particular individual or an entity.
It is generated by CA (Certifying
Hashed value of original message is Authority) that involves four steps: Key
Process / encrypted with sender’s secret key to Generation, Registration, Verification, and
Steps generate the digital signature. Creation.
Electronic Governance
Elements of E-Governance:
Basic elements of e-governance are:
1. Government
2. Citizens
3. Investors/Businesses