Get Digital Signature At Best Price By India Tax

Category: Entertainment

Presentation Description

No description available.


Presentation Transcript

slide 1:

What is a Digital Signature System A ​Digital Signature is a mathematical technique used to validate the authenticity and integrity of a message software or digital document. As the digital equivalent of a handwritten signature or stamped seal a digital signature offers far more inherent security and it is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide the added assurances of evidence of origin identity and status of an electronic document transaction or message and can acknowledge informed consent by the signer.

slide 2:

Classes of digital signatures There are three different classes of ​Digital Signature Certificates ​: ● Class 1: ​Cannot be used for legal business documents as they are validated based only on an email ID and username. Class 1 signatures provide a basic level of security and are used in environments with a low risk of data compromise. ● Class 2 ​: Often used for e-filing of tax documents including income tax returns and ​Goods and Services Tax GST returns ​. Class 2 digital signatures authenticate a signers identity against a pre-verified database. Class 2 digital signatures are used in environments where the risks and consequences of data compromise are moderate. ● Class 3: ​ The highest level of digital signatures. Class 3 signatures require a person or organization to present in front of a certifying authority to prove their identity before signing. Class 3 digital signatures are used for e-auctions e-tendering e-ticketing court filings and in other environments where threats to data or the consequences of a security failure are high. How to create a digital signature

slide 3:

To create a digital signature signing software -- such as an email program -- creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information such as the ​hashing ​ algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value which is usually much shorter. This saves time as hashing is much faster than signing. The value of a hash is unique to the hashed data. Any change in the data even a change in a single character will result in a different value. This attribute enables others to validate the integrity of the data by using the signers public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data it proves that the data hasnt changed since it was signed. If the two hashes dont match the data has either been tampered with in some way -- a compromise to its integrity -- or the signature was created with a private key that doesnt correspond to the public key presented by the signer --an issue with ​authentication ​. A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the senders identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer and it binds them together. This property is called ​nonrepudiation ​. Digital signatures are not to be confused with ​digital certificates ​. A digital certificate an electronic document that contains the digital signature of the issuing ​certificate authority ​ binds together a public key with an identity and can be used to verify that a public key belongs to a particular person or entity. Most modern email programs support the use of digital signatures and digital certificates making it easy to sign any outgoing emails and validate digitally

slide 4:

signed incoming messages. Digital signatures are also used extensively to provide proof of authenticity data integrity and nonrepudiation of communications and transactions conducted over the internet.

authorStream Live Help