digital signature

advertisement
DIGITAL SIGNATURE
Jyotika dhingra1, spardha taneja2, ruchika khetan3
1
Computer Science & Engineering, Dronacharya College of Engineering, Gurgaon, Haryana.
2
Computer Science & Engineering, Dronacharya College of Engineering, Gurgaon, Haryana.
3
Computer Science & Engineering, Dronacharya College of Engineering, Gurgaon, Haryana
Abstract
Digital signatures concept is inherited from traditional paper-based signing and turns it into
a digital "fingerprint". Digital signatures allow us to easily migrate from hefty paper-based
processes to a secure and efficient document.
It is a type of asymmetric cryptography used to simulate the security properties of a
signature in digital.
This "fingerprint", is unique to both the signer and the document. This ensures that the
person who signed is the originator of the message. This fingerprint cannot be reused or
reassigned to anyone else at any time. The digital signature authenticates the originator of
the message and ensures that the message has not been modified after sending. If any
changes were made to the document after it was signed, they would automatically
invalidate the signature, thereby protecting against forgery.
Digital signatures help organizations to sustain signer authenticity, accountability, data
integrity and non-repudiation of documents and transactions.
Digital signature schemes normally give two algorithms, one for signing which involves the
user's secret or private key, and one for verifying signatures which involves the user's
public key. The output of the signature process is called the "digital signature”.
1. What is digital signature?
A digital signature is a series of mathematical processes and terms that transform data (e.g.,
a Word document, PDF, or XML file) into a uniquely coded message so that no other
person other than the originator could identify the text code.
Figure 1: Sample Digital Signature
1.1 Organizational Use
1. Sustain signer authenticity.
2. Accountability.
3. Data integrity.
4. Non-repudiation of documents and transactions.
1.2 Difference between digital and electronic signatures
 Digital signatures are Advanced or Secure Electronic Signatures whereas Electronic
signatures are electronic images that are physically or logically attached to the
signed data
 Digital signatures are a result of a cryptographic operation while adding a sentence
“I, Dipti Bahuguna, sign this document” is good enough to be considered as an
electronic signature.
 The digital signature cannot be copied, tampered or altered. On the other hand,
however, electronic signatures are easy to forge.
 Digital Signature is error free while Electronic one is error prone.
The technology behind digital signatures is a standard known as Public Key
Infrastructure (PKI), which guarantees security.
How digital signature looks like.
2. How it is created?
A digital signature is a series of mathematical processes that transform data (e.g., a Word
document, PDF, or XML file) into a uniquely coded “message digest” example md5
algorithm. The sender encrypts the message digest (known as digital signature), attaches it
to or embeds it in a file, and sends the package to the intended recipient. Once the package
is received and the message digest is decrypted, a determination of authenticity and
integrity can be made.
Digital signature creation usually involves two processes, one performed by the signer and
the other by the receiver of the digital signature:
•
Digital signature creation uses a hash result derived from and unique to both the
signed message and a given private key. For the hash result to be secure there must
be only a negligible possibility that the same digital signature could be created by
the combination of any other message or private key.
•
Digital signature verification is the process of checking the digital signature by
reference to the original message and a given public key, thereby determining
whether the digital signature was created for that same message using the private
key that corresponds to the referenced public key.
If the digital signature matches the identity of the sender one can be reasonably assured that
it was sent by the individual associated with the digital signature. If the message digests
receives the matched message digest as calculated by the recipient.
2.1 The Hash Function
A file (or other collection of data) is transformed into a message digest via a mathematical
function referred to as a “hash.” The hash function reduces the file to a smaller one with a
fixed number of bits. The smaller file contains some representation of the contents of the
actual document.
The hash function acts as any other mathematical formula – the result (message digest/digital
signature) will depend on the operand (file) to which the function is applied. Just as the
mathematical function “multiply by seven” will produce 49 when the operand is seven and 35
when the operand is five, the hash function will create a unique message digest based on the
contents of the file.
Often referred to as a “digital fingerprint,” the digital signature created by the hash function is
wholly unique because individual files have unique contents and characteristics.
There are a number of different hash functions in use including Rivet’s MD5, which reduces
a file to a 128-bit message digest, and NIST’s Secure Hash Algorithm (SHA), which creates a
160-bit message digest.
In addition to being a “collision free” algorithm, or one that creates a wholly unique message
digest, the digital signature created by the hash function should not be able to be reverse
engineered. In other words, given the result of the hash function (i.e., the message
digest/digital signature) it is virtually impossible to reconstruct the document or other
collection of data from that information.
2.3 Encryption
Once the message digest is created by the hash function, it is encrypted.
In order to encrypt any message, an individual requires a unique digital identity to which he
is bound (almost like a social security number). That unique identifier is given a pair of
“keys,” one private (known only to the individual) and one public (used by individuals
exchanging encrypted messages with the owner of the private key).
The keys are actually associated algorithms used to transform data (e.g., message contents)
into a format unintelligible to the human eye and then transform it back again. Only the
associated key can unlock content encrypted by the other.
Once the hash function has been applied to the file and the message digest created, the sender
uses his unique private key to encrypt it. Once encrypted, the digital signature can be
embedded in the file (enveloped) or attached to it as a separate file (detached). The package is
then dispatched to the intended recipient.
Upon receipt, the recipient “unlocks” the message digest via a public key associated with the
sender’s private key (asymmetric cryptography). If the public key successfully decrypts the
digital signature, the file has in fact been sent by the individual associated with the digital
identifier (or, worst case scenario, someone with access to that identifier).
The process of generating, assigning, and managing unique digital identifiers and issuing
keys is carried out by nationally-accredited third parties called Certificate Authorities (e.g.,
Symantec, or Microsoft Certificate Services, which run on Windows server operating
systems). These third parties and the policies that dictate the issuing of digital identifiers are a
large part of the Public Key Infrastructure (PKI) that makes the use of digital signatures and
other security measures feasible.
Also there is an alternative encryption process in which a sender and recipient use the same
key to encrypt and decrypt a file (symmetric encryption). However this is not supported by
digital signatures, which rely on the association between a digital identifier and an individual
to enforce the principle of non-repudiation. In other words, a sender whose digital signature is
attached to a file cannot deny having sent it because his “digital DNA” is associated with it.
Once the message digest has been decrypted the authenticity of the digital signature has been
established and the integrity of the file can be determined.
Once the recipient gets the file and decrypts the digital signature, the same hash function is
applied. If the message digest created on the recipient’s end is identical to the file’s message
digest, it has not been altered since the digital signature was attached or embedded. If there is
a discrepancy between the original and re-created digital signatures, the file has been altered
in some way.
3. Example
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
3.1 Applications

Aadhar cards
Encryption of resident data (PID block) at the time of capture using 2048 bit PKI.
 HMAC (Hmac tag) of PID block to eliminate tampering:
 Hash-based Message Authentication Code (HMAC) is a specific construction for
calculating a message authentication code (MAC) involving a cryptographic hash
function in combination with a secret key. As with any MAC, it is useful to
simultaneously verify both the data integrity and the authenticity of a message.
 AUA license key to enable/disable specific features.
 Digitally signed AUA packet for tamper proofing and authenticity.
How they are authenticated.
4. How to Validate Digital Signatures on e-Aadhar?
In case you see the ‘validity unknown’ icon on your e-Aadhar, please follow the
below procedure: 1) Right click on the ‘validity unknown’ icon and click on ‘Validate Signature’.
2) You will get the signature validation status window, click on ‘Signature
Properties’.
3)
Click on ‘Show Certificate.
4) Verify that there is a certification path named 'CCA India 2011'. This identifies
CCA India as the owner of the digital certificate that has been used when signing the
document.
5) Mark the certification path named 'CCA India 2011', click the 'Trust' tab and
then 'Add to Trusted Identities'.
6) Answer 'OK' to any security question that follows.
7) Check (√) the field for 'Use this certificate as a trusted root' and click 'OK' twice
to close this and the next window.
8) Click 'Validate Signature' to execute the validation.
5. Conclusion
It’s validity relieves both sender and receiver from being part of crime. It is very important
tool in business or any organisation for the authenticity of transaction in all types of
interaction through computer. Most advantage of digital signature is that it can never be
altered because the private key or password is known to the user who has signed the
document.
Digitally signed document can easily detect the act of fraud etc which can’t be easily
detected on a printed or written document.
6. References
http://www.altova.com/digital_signature_technology_primer.html
http://www.signix.com/blog/bid/93731/How-Does-it-Work-Digital-Signature-Technologyfor-Dummies
http://searchcio.techtarget.in/tutorial/Aadhar-project-UID-and-the-role-of-IT-in-its-success
https://eaadhaar.uidai.gov.in/ValidateDocumnet/ValidateDigitalSignatures.htm
http://www.scribd.com/doc/30742303/Digital-Signature-PPT
http://susurs.mii.lu.lv/juris/courses/AC2013/presentations/digital_signatures.ppt
http://www.stqc.gov.in/sites/upload_files/stqc/files/TestingMethodologies3july.pdf
https://tao.truststc.org/Members/yuanxue/network_security/Public%20resources/lecture12_
folder/lecture12
http://www.digitalsignature.co.nz/FAQ/Facts_about_digital_signatures.pdf
http://cca.gov.in/cca/sites/default/files/files/ccapresentation.ppt
Download