Skip to main content

Explain the process of creation and verification of Digital Signature.



Q.2 (a) Explain the process of creation and verification of Digital Signature.


1. Introduction

Digital signature is the heart of the Information Technology Act, 2000 because it gives legal validity to electronic records.
It is equivalent to a handwritten signature in the physical world.

Section 3 & 3A of the IT Act provide the legal foundation of digital signatures and electronic signatures.

Digital signatures ensure:

  • Authenticity → Sender is genuine
  • Integrity → Data not altered
  • Non-repudiation → Sender cannot deny sending

2. Process of Creation of Digital Signature

Digital signature is created through Public Key Infrastructure (PKI) using two keys:

  • Private Key → known only to the signer
  • Public Key → available to everyone

The process includes the following steps:


Step 1: Hashing the Document

  • Before signing, the document is converted into a hash value (mathematical summary).
  • This ensures security and faster processing.

Step 2: Encryption with Private Key

  • The hash value is encrypted with the signer’s private key.
  • This encrypted hash becomes the digital signature.

Step 3: Attaching the Signature

  • The digital signature is attached to the electronic record or document.

Step 4: Sending the Document

  • Signed electronic document is sent to the receiver.

3. Process of Verification of Digital Signature

Verification is done using the public key of the signer.


Step 1: Receiver Obtains Public Key

  • Public key is available through the Digital Signature Certificate (DSC) issued by a Certifying Authority (CA).

Step 2: Decryption of the Signature

  • Digital signature is decrypted using the signer’s public key.

Step 3: Re-Hashing the Original Document

  • Receiver generates a new hash from the received document.

Step 4: Compare Both Hash Values

If both hash values match, then:

  • Signature is valid
  • Document not tampered
  • Sender is genuine

If they do not match, verification fails.


4. Legal Basis (Sections of the IT Act)

  • Section 3 → Digital Signature using asymmetric crypto system + hash function.
  • Section 3A → Electronic Signature provisions.
  • Section 5 → Legal recognition to digital signatures.
  • Section 15 → Secure digital signatures.

5. Case Laws Related to Digital Signatures

1. P.R. Transport Agency v. Union of India

  • Online tenders submitted with digital signatures are valid.

2. Trimex International v. Vedanta Aluminium (2010)

  • Emails and digital signatures can form a binding contract.

3. State of Maharashtra v. Dr. Praful B. Desai

  • Court recognised the importance of electronic processes in justice administration (video testimony allowed)—supports digital authentication culture.

6. Conclusion

The digital signature system provides security, trust, and legal authenticity to electronic communications, making online business, e-governance, and e-contracts legally reliable in India.


⭐⭐ Q.2 (b) Discuss the functions and powers of Controller of Certifying Authorities (CCA).


1. Introduction

The Controller of Certifying Authorities (CCA) is appointed under Section 17 of the IT Act, 2000.
CCA regulates and supervises the entire digital signature infrastructure in India.

CCA ensures:

  • trust in electronic transactions
  • proper functioning of Certifying Authorities (CAs)
  • security of digital signatures

2. Major Functions of CCA


1. Licensing Certifying Authorities (Section 21)

CCA grants licenses to organizations to act as Certifying Authorities.
Only licensed CAs can issue Digital Signature Certificates.


2. Laying Down Standards (Section 18)

CCA defines:

  • security standards,
  • procedure for digital signatures,
  • encryption standards,
  • hardware and software guidelines.

3. Monitoring Certifying Authorities

CCA regularly checks:

  • whether CAs follow rules,
  • maintain security,
  • keep proper records,
  • renew or suspend licenses if needed.

4. Audit and Inspection (Section 28)

CCA has the power to:

  • conduct audits,
  • inspect the systems of Certifying Authorities,
  • review their security practices.

5. Specifying Digital Signature Formats

CCA notifies:

  • X.509 certificate format,
  • cryptographic algorithms,
  • key sizes,
  • digital signature standards.

6. Maintaining the National Repository of Digital Certificates (NRDC)

CCA maintains a government repository containing:

  • all digital signature certificates,
  • public keys of Certifying Authorities.

This allows safe verification of signatures.


7. Power to Suspend or Revoke License (Section 25)

CCA can:

  • suspend,
  • revoke,
  • cancel a CA’s license for violations.

8. Dispute Resolution

CCA settles disputes:

  • between subscriber and CA,
  • between two CAs,
  • or between CA and any person affected.

9. Framing Rules & Regulations

CCA frames:

  • guidelines for digital signatures,
  • certification practice statements,
  • subscriber agreement rules.

3. Powers of CCA

1. Investigative Powers

CCA can:

  • call for documents,
  • inspect equipment,
  • order inquiries.

2. Enforcement Powers

CCA can:

  • impose penalties,
  • suspend licenses,
  • abolish faulty CAs.

3. Technical Powers

CCA decides:

  • cryptographic methods,
  • security protocols,
  • standards for keys and certificates.

4. Administrative Powers

CCA appoints:

  • Deputy Controllers,
  • Assistant Controllers,
  • and staff to monitor operations.

4. Case Laws Related to CCA

1. P.V. Anvar v. P.K. Basheer (2014)

Court highlighted the importance of proper certification for digital evidence.
CCA rules guide proper certification practice.

2. P.R. Transport Agency Case

Court upheld validity of digital signatures, indirectly supporting the work of CCA.


5. Conclusion

CCA is the backbone of the digital signature and e-authentication system in India.
It ensures:

  • trust,
  • transparency,
  • reliability,
  • security

in all electronic transactions governed under the IT Act, 2000.



Comments

Popular posts from this blog

UPSI Syllabus 2025 & Exam pattern 2025

UP SI 2025 Exam Pattern Subject Questions Marks General Hindi 40 100 Law/Constitution & General Knowledge 40 100 Numerical & Mental Ability Test 40 100 Mental Aptitude/Intelligence/Reasoning 40 100 Total 160 400 Exam Mode : Online (CBT) Duration : 2 hours (120 minutes) Negative Marking : No Qualifying Marks : Minimum 35% in each subject and 50% overall Subject-Wise Syllabus 1. General Hindi समास, संधि, वाक्यांश के लिए एक शब्द पर्यायवाची, विलोम शब्द मुहावरे और लोकोक्तियाँ रस, अलंकार, छंद वाक्य संशोधन, वर्तनी अपठित गद्यांश (Comprehension) हिंदी साहित्य के प्रमुख लेखक और रचनाएँ 2. Law, Constitution & General Knowledge A. General Knowledge भारत का इतिहास और स्वतंत्रता संग्राम भूगोल (भारत और विश्व) विज्ञान और तकनीक करेंट अफेयर्स पुरस्कार, किताबें और लेखक महत्वपूर्ण राष्ट्रीय/अंतर्राष्ट्रीय संगठन खेलकूद, राजनीति, अर्थव्यवस्था B. Indian Constitution & Law संविधान की विशेषताएँ मौलिक अधिकार और कर्तव...

Arrest under BNSS 2023: Grounds, Sections, and Case Laws

Bare act provision  Arrest by private person [section 40] Section 40 lays down the circumstances  when a private person can arrest and procedure on such arrest Circumstances in which a private person can arrest: Any private person may arrest or cause to be arrested who in the presence of private person. i) commits a non - bailable and           cognizable offence. ii) Any proclaimed offender. 2: Arrest by magistrate section 41 The Bharatiya Nagarik Suraksha Sanhita, 2023 (BNSS 2023), enacted to replace the colonial-era Criminal Procedure Code (CrPC), brings a renewed focus on balancing citizen rights and policing powers . Arrest, being a powerful tool in the hands of law enforcement, is rightly placed under scrutiny in BNSS 2023. Let’s break down what "arrest" means under this new law, the grounds under which it can occur, and the protective safeguards embedded within. What is Arrest Arrest is the legal restraint of a person’s libe...

Smith v Hughes (1959): A Landmark Case on Interpreting the Law

Smith v Hughes (1959): Introduction The case of Smith v Hughes (1959) is one of the most iconic examples in English law that demonstrates the Mischief Rule of statutory interpretation. At first glance, it may seem like a simple case involving a street solicitor (a prostitute), but it ended up clarifying how judges should interpret the true purpose of a law. Facts of the Case Mrs. Smith, the defendant, was a prostitute. However, unlike many others, she wasn’t soliciting from the street. Instead, she operated from inside her apartment in London. She would call out or attract clients through her window or by tapping on the glass, facing the public street below. She was charged under Section 1(1) of the Street Offences Act 1959 , which says: “It shall be an offence for a common prostitute to loiter or solicit in a street or public place for the purpose of prostitution.” Now here's the twist: Smith argued she wasn’t in the street , so she claimed the law didn’t apply to her ...