Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT...

23
ntroller of rtifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy Controller

Transcript of Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT...

Page 1: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Controller ofCertifying Authorities

Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status

Mrs Debjani NagDeputy Controller

Page 2: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Electronic Transactions

The success of electronic transactions depends on“the trust that the transacting parties place in the

security of the transmission and content of their communications”

• Authenticity• Non-Repudiability• Confidentiality • Integrity

Page 3: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Information Technology (IT) Act, 2000

Accorded legal recognition to Digital signatures Digital signatures treated at par with handwritten signaturesTechnology-specific

Page 4: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public key cryptography for Digital signatures

Pair of keys for every entityOne Public key – known to everyone

One Private key – known only to the possessor

To digitally sign an electronic document the signer uses his/her Private key.

To verify a digital signature the verifier uses the signer’s Public key.

No need to communicate private keys

Page 5: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Creating a Digital signature

Encryption Algorithm

Encryption Algorithm

Signed document

DocumentDocument

Document+

Digital signature

Document+

Digital signature

Private KeyPrivate Key

Page 6: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Verifying a Digital signature

Decryption Algorithm

Decryption Algorithm

Document+

Digital signature

Document+

Digital signature

Signature verification and

Document integrity

Signature verification and

Document integrity

Public Key of signer

Public Key of signer

Page 7: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public key Cryptography & Digital Signatures

Assurance of Authenticity of the Digital Signature created by the Private key is determined by the Trust that can be placed in the Public key

Public key Certificates or Digital Signature Certificates bind a “public key” to an “Identity”

Page 8: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public key Cryptography & Digital Signatures

Change in Document => Change in the Digital Signature

 Digital Signature is bound to the Document as well as the Signer => Assurance of Integrity

 

Page 9: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Issues in Public key Cryptosystems

How will verifier get signers public key?How will verifier authenticate signers public key ?How will the signer be prevented from repudiating his/her digital signature?

Page 10: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public key Cryptography & Digital Signatures

Digital Signature Certificates(containing the public key) are issued by Certifying Authorities after Identity verification

 Responsibility of protecting the private key lies with its owner.

Loss or compromise of private key should be communicated to the CA so as to result in REVOCATION of the corresponding Digital Signature Certificate.

Page 11: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Certifying Authority

Issues Digital signature Certificates (Public Key Certificates). Is widely known and trustedHas well defined methods of assuring the identity of the parties to whom it issues certificates.Confirms the attribution of a public key to a person by means of a public key certificate.Always maintains online access to the Digital Signature Certificates issued.

Page 12: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public Key Certification

Usercredentials

User’sPublicKey

CA’sName

Validationperiod

Signatureof CA

Usercredentials

User’sPublicKey

CA’sName

Validationperiod

Signatureof CA

User 1 certificate

User 2 certificate.

User 1 certificate

User 2 certificate.

DigitallySigned usingCA’s

privatekey

DigitallySigned usingCA’s

privatekey

Usercredentials

Usercredentials

User’s Publickey

User’s Publickey

Digital Signature Certificate Certificate Database

PublishCertificateRequest

Page 13: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Certificate Revocation List (CRL)

A list of Certificates that have been revoked and declared invalid

Page 14: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Public Key Infrastructure & the IT Act 2000

Controller of Certifying Authorities as the “Root” Authority certifies the technologies and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates

Page 15: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

CCA’s roleLicensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities. Controller of Certifying Authorities as the “Root” Authority certifies the technologies and practices of all the Certifying Authorities licensed to issue Digital Signature CertificatesCertifying the public keys of the CAs, as Public Key Certificates (PKCs). Laying down the standards to be maintained by the CAs, Addressing the issues related to the licensing process including:

• Approving the Certification Practice Statement(CPS); • Auditing the physical and technical infrastructure of the

applicants through a panel of auditors maintained by the CCA.

Page 16: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Audit Process

Adequacy of security policies and their implementation;Existence of adequate physical security;Evaluation of functionalities in technology as it supports CA operations;Compliance to the adopted Certification Practice Statement (CPS);Adequacy of contracts/agreements for all outsourced CA operations;Adherence to Information Technology Act 2000, the Rules, Regulations and Guidelines issued by the Controller from time-to-time.

Page 17: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

CCA’s technical Infrastructure

The CCA operates the following :-Root Certifying Authority (RCAI) under section 18(b) of the IT Act, and National Repository of Digital Signature Certificates (NRDC) under section 20 of the IT Act.

Page 18: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Internet

Directory Client

CA

CA

CA

LAN

Cert/CRL

Cert/CRL

Cert/CRL

RCAI

CCA

NRDC

RelyingParty

SubscriberSubscriber Subscriber

CA Public Keys Certified by RCAI CA’s Revoked Keys

CCA : Certificates of Public Keys of CAs National Repository of Certificates

Page 19: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

CCA

TCSCA NICCASafescrypt

India PKI

IDRBTCAiCert(CBEC)

(n)CodeMTNLTrustline

Page 20: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

PKI enabled Applications

eProcurementIFFCODGS&DONGCGAILAir-IndiaRailways

OthersMCA21Income Tax e-filingIRCTCDGFTRBI Applications (SFMS)

Page 21: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Challenges ahead

InteroperabilityUniformity in certificate contentsValidation methods - Certificate Revocation Lists,..International alliances

End User AdoptionApplication interoperability.Digital Signature Certificate interoperability.Trusted Verification Authority.Storage medium

Page 22: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Challenges ahead ..contd

Awareness• Understanding of digital signature concepts• Knowledge about legal rights, duties and

liability of owning digital certificate

Page 23: Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.

Controller ofCertifying Authorities

http://cca.gov.in

Thank you