E Signatures 2
E Signatures 2
E Signatures 2
LAVASA CAMPUS
E-signatures
PRESENTED BY:
Hemang Wadhwa
((20113122)
BBA LLB (H)
E- Signatures and Digital Signatures
Laws overview/background
Duties of CA
Powers of CCA
Tip: Kindly jot down the key pointers from
the speech, the ppt on contains pointers.
ESC & DSC
How: Listen and write.
Contains of e-certificate
Digital
signatures and
E- signatures
Digital signatures
A signature is a symbolic and
essential representation of
one’s identity.
E-Signatures
The European Union Regulation
910/214 defines and regulates
electronic signature as “in
electronic form which is
attached to or logically
associated with other data in
electronic form and used by the
signatory to sign”
Laws Overview Back to Index
for validity
linked to the signatory or the signature or data are detectable.
authenticator and not to any other
person.
In addition to encryption, cryptography (particularly asymmetric cryptography) can be used to verify the identity of a user and guarantee
the integrity of the data. This is possible through the Digital Signature.
It is important to clarify the difference between an electronic signature and Digital Signature. The electronic signature can be any type of
file, image, logo, or digitized handwritten signature that serves to identify a user but does not use any type of cryptography or
sophisticated algorithm for its generation
PKI digital signature is integrated in an encrypted way by complementary information that is sent along with the signed message. The
algorithms that are used for the generation and verification of the message are the following:
Tip: RULES are not a part of syllabus as per course plan but a good way to earn some extra marks during exams. :)
RULES UNDER IT ACT, 2000
1. Submission of application (Sec. 22 and Rule 10): Every application for the issue of a
licence shall be in such form as may be prescribed by the Central Government and shall
be accompanied by :
can ignore this
a. A Certificate Practice Statement (CPS) ;
while revising if b. A statement including the procedures with respect to identification of the applicant ;
your brain is
overheating. :p
c. Payment of non-refundable fee of ` 25,000 ;
d. Such other documents as may be prescribed by the Central Government.
2. Validity of licence (Rule 13): A licence shall be valid for a period of 5 years from the date
of its issue and the licence shall be non-transferable or non-heritable.
3. Issuance of licence (Sec. 24 and Rule 16)
4. Renewal of licence (Sec. 23 and Rule 15): An application for renewal of a licence shall be
a. in such form as prescribed by the Central Government
b. accompanied by payment of non-refundable fee of ` 25,000 and
c. made not less than 45 days before the date of expiry of the period of validity of
licence.
5. Suspension of licence (Sec. 25 and Rule 14): No Certifying Authority whose licence has
been suspended shall issue any electronic signature certificate during such suspension
[Sec. 25(3)].
PROVISIONS UNDER IT ACT, 2000
Introduction
Sections 17 to 34 of Chapter VI of the Act provide for the Controller of Certifying Authorities (CCA) to licence and
regulate the working of Certifying Authorities (CAs). CCA also ensures that none of the provisions of the Act are violated.
The regulation of certifying authorities or electronic signature infrastructure in India consists of :
Controller of Certifying Authority (CCA). The IT Act, 2000 provides for an appointment, functions, powers, duties
of CCA (the apex regulatory body for certifying authorities in India) and other officers.
Certifying Authorities (CAs). A certifying authority is a trusted third party or entity that will get personal licence
from the controller and will issue electronic signature certificate to the users of e-commerce. These authorities
will function under the supervision and control of the controller of certifying authorities.
The notice of suspension or revocation may be published in the database maintained by the controller (Sec. 26).
DUTIES OF CERTIFYING AUTHORITY UNDER IT ACT, 2000
1.To follow certain procedures regarding security system (Sec. 30). The Act has laid down certain procedures relating to
security system to be followed by the certifying authority in the performance of its services. It must :make use of hardware,
software, and procedures that are secure from intrusion and misuse ;
provide a reasonable level of reliable services ;
adhere to security procedures to ensure the secrecy and privacy of electronic signatures ;
be the repository of all Electronic Signature Certificates ;
publish information regarding its practices, Electronic Signature Certificates and current status of such certificates ; and
observe the specified standards.
The above stated security procedures must ensure the achievement of 4 objectives of a security system : Confidentiality,
accessibility of information, consistency of information and authorized use of resources
2.To ensure compliance of the Act (Sec. 31). The certifying authority must ensure that every person employed or engaged
by it complies with the provisions of the Act, rules, regulations or order, made thereunder.
3.To display its licence (Sec. 32). The certifying authority must display its licence at a conspicuous place in the premises in
which it carries on its business.
4.To surrender its licence (Sec. 33). The certifying authority must surrender its licence to the controller on its suspension
or revocation
5.To make certain disclosures (Sec. 34). The certifying authority is required to make the following disclosures : (P.T.O --->)
DUTIES OF CERTIFYING AUTHORITY UNDER IT ACT, 2000
5.To make certain disclosures (Sec. 34). The certifying authority is required to make the following disclosures :
Disclosure of Electronic Signature Certificate ;
Disclosure of Certification Practice Statement (CPS) ;“Certificate Practice Statement” means a statement issued by a
certifying authority to specify the practices that the certifying authority employs in issuing electronic signature
certificates [Sec. 2(1)(k)]
It also outlines the CA’s policies, practices and procedures for verifying keys and suspension, revocation and renewal of
electronic signature certificates.
Disclosure of notice of revocation and suspension of Certificates of Certifying Authority ;
Disclosure of facts materially and adversely affecting the reliability of electronic signature certificate ;
Disclosure of adverse effects to affected person [Sec. 34(2)]. The authority is bound to disclose to affected person about
any event which may materially and adversely affect the integrity of the computer system or the conditions under which
electronic signature certificate was granted. The certifying authority is required to act in accordance with the procedure
specified in its CPS to deal with such event or situation.
POWERS OF CERTIFYING AUTHORITY UNDER IT ACT, 2000
1. Power to authorise in writing, the deputy or the assistant controller or any officer to exercise any of his powers (Sec. 27).
2. Power to investigate any contravention of the Act or rules or regulations made thereunder. [Sec. 28(1)].
3. Power to direct a certifying authority or any employee of such authority to take such measures or to cease to carry on
such activities if these are necessary to ensure compliance with the provisions of the Act, rules or any regulations made
thereunder [Sec. 68(1)].
4. Power to direct any agency of the government to intercept any information transmitted through any computer resource
if it is necessary in the interest of the sovereignty or integrity of India, security of state, friendly relations with foreign
state etc. [Sec. 69(1)].
5. Power to issue directions for blocking the public access of any information through any computer resource in the
circumstances given under point No. 4 (Sec. 69A).
6. Power to authorize to monitor and collect traffic data or information through any computer resource for cyber security
(Sec. 69B).
7. Power to make regulations for carrying out the purposes of this Act after consultation with the cyber regulatory advisory
committee and previous approval of Central Government. The regulations may pertain to the following :
a. Particulars regarding maintenance of database containing disclosure of record of every CA [Sec. 18(n)]
b. Conditions and recognition of Foreign Certifying Authority [Sec. 19(1)].
c. Terms and conditions for grant of licence to CA [Sec. 21(3)].
d. Standards to be observed by CA [Sec. 30(d)]
POWERS OF CERTIFYING AUTHORITY UNDER IT ACT, 2000
7.Power to exercise himself or through an authorized officer the following powers which are conferred on Income Tax
Authorities under Chapter XIII of the Income Tax Act, 1961 :
Power to inspect, enforce attendance of any person and examine him on oath,
Power to conduct search and seizure,
Power to requisite books of account,
Power to call for information,
Power to inspect and take copies of register of members or debenture holders,
Power to make inquiries.
Contents of Digital Signature Certificate
(Rule 7)
A digital signature certificate includes the following :
Tip: RULES are not a part of syllabus as per course plan but a good way to earn some extra marks during exams. :)
E-Signature Certificate
According to Sec. 2(1)(tb) ‘Electronic Signature Certificate’ means “an electronic signature certificate issued under
section 35 and includes Digital Signature Certificate.”Digital Signature Certificates are the electronic equivalent of
physical or paper certificates (e.g., drivers’ licence, passport, membership card etc.). There are basically 3 types of
digital signature certificates : Class I, Class II and Class III and each having different level of security.
Classes of Back to index
Certificate
Class 1: certificates shall be issued to individuals/private
subscribers. These certificates will confirm that user's
name (or alias) and E-mail address form an unambiguous
subject within the Certifying Authorities database.
1. Suspension of Digital Signature Certificate (Sec. 37). The certifying authority which has issued a digital signature
certificate may suspend such DSC in the following circumstances :
a. On the request of a subscriber or the person duly authorized by him. [Sec. 37(1)]
b. In public interest, if the certifying authority has formed such opinion.
c. However, such suspension cannot exceed a period of 15 days unless the subscriber has been given an opportunity
of being heard [Sec. 37(2)]. Further, the Certifying Authority shall communicate the suspension to the subscriber
[Sec. 37(3)].
2. Revocation of Digital Signature Certificate (Sec. 38). A certifying authority can revoke a DSC under any of the
following circumstances :
i. On the request of the subscriber or any other person authorized by him.
ii. On the death of the subscriber.
iii. On the dissolution of the firm or winding up of company where subscriber is a firm or a company.
iv. If Certifying Authority is of the opinion that :
1. a material fact represented in the DSC is false or has been concealed.
2. a requirement for the issuance of the DSC was not satisfied.
3. the CA’s private key or security system was compromised in a manner materially affecting the DSC’s
reliability.
4. the subscriber has been declared insolvent or dead or where a subscriber is a firm or a company, which has
been dissolved, wound up or ceased to exist.
PROCEDURE TO ISSUE ESC UNDER IT ACT, 2000
A DSC shall not be revoked unless the subscriber has been given an opportunity of being heard in the matter [Sec. 38(1)].
Further, on revocation of a DSC under this section, the authority shall communicate the same to the subscriber [Sec. 38(2)].
Notice of suspension or revocation (Sec. 39)
Where a DSC is suspended or revoked u/s 37 or u/s 38, the CA shall publish a notice of such suspension or revocation in
the repository specified in the DSC for publication of such notice [Sec. 39(1)]. Further, where one or more repositories are
specified, the CA shall publish notices of such suspension or revocation in all such repositories.
Not a
DUTIES OF SUBSCRIBERS UNDER IT ACT, 2000 part of
syllabus
Definition.
According to Sec. 2(1)(zg), “Subscriber” means a person in whose name the electronic signature certificate is issued.Sections 41
to 43 of Chapter VIII of Information Technology Act prescribe the following duties of subscribers who have obtained the Digital
Signature Certificate from some certifying authority :
1. Generating Key Pair (Sec. 40). Where any DSC has been accepted by the subscriber, he has a duty to generate the key pair
consisting of public key to which private key of the subscriber corresponds and which is to be listed in the digital signature
certificate by applying the security procedure prescribed under Section 16
DUTIES OF SUBSCRIBERS UNDER IT ACT, 2000
2. Duty of subscriber of Electronic Signature Certificate (Sec. 40A). In respect of Electronic Signature Certificate the subscriber shall
perform such duties as may be prescribed [Inserted vide ITAA, 2008].
3. Acceptance of Digital Signature Certificate (Sec. 41). Acceptance of digital certificate entitles him to the rights under it as well as imposes
some obligations upon him. Sub-sections 1 and 2 of Section 41 provide the following provisions relating to acceptance of certificate by the
subscriber :
a. A subscriber shall be deemed to have accepted a DSC if he publishes or authorizes the publication of Digital Signature Certificate :
i. to one or more persons ;
ii. in a repository, or otherwise demonstrates his approval of DSC in any manner.
b. Acceptance of DSC amounts to certification by the subscriber to all who rely on the information contained there-in that :
i. the subscriber holds and is entitled to hold the private key corresponding to the public key listed in the DSC.
ii. all representations made by the subscriber to the CA and all information contained in the DSC are true.
iii. all information contained in the DSC that is within the knowledge of the subscriber is true.
4. Control of Private Key (Sec. 42). Sub-sections (1) and (2) of Section 42 lay down the following duties of the subscriber relating to the
control of private key :
a. Duty to exercise reasonable care to retain control of the private key corresponding to the public key listed in the DSC.
i. Duty to take all steps to prevent disclosure of private key.
ii. If the private key has been compromised (lost), duty to communicate the same to the certifying authority without any delay.
In case of compromise of private key till such information is given to the certifying authority, the subscriber shall continue to be liable
[Explanation to Sec. 42(2)].
DIFFERENCE BETWEEN E-SIGNATURE
AND DIGITAL SIGNATURE
E- SIGNATURE DIGIAL SIGNATURE
It has been defined under Section It has been defined under Section
SECTION 2(1)(ta) of the Information 2(1)(p) of the Information Technology
Technology Act, 2000. Act, 2000.
An electronic signature is
A digital signature is authenticated
MODE OF AUTHENTICATION authenticated using a phone
using a digital signature certificate.
number, SMS, etc.
Thank you