Professional Documents
Culture Documents
Digital Signature Certifying Authority-Cryptography
Digital Signature Certifying Authority-Cryptography
While the ICT Act is the primary legislation dealing with electronic signatures in Bangladesh,
also relevant are the Information Technology (Certifying Authority) Rules 2010 (CA Rules);
National Information and Communication Technology Policy 2018; and the Certification
Practice Statement published by the Office of the Controller of Certifying Authorities (CCA). At
this time there is no case law that deals with electronic or certificate-based digital signatures.
The ICT Act uses the terms electronic signature and digital signature interchangeably. In fact, the
Bengali version of the ICT Act refers to “electronic signature” whereas the English version uses
“digital signature”. According to the Act, electronic signatures (or digital signatures, in the
English version) must be able to:
Section- 2 (1) of the ICT Act, 2006, "digital signature" means data in an electronic form, which--
(a) is related with any other electronic data directly or logically; and
(b) is able to satisfy the following conditions for validating the digital signature--
(iii) created in safe manner or using a means under the sole control of the signatory; and
(iv) related with the attached data in such a manner that is capable to identify any alteration made
in the data thereafter.
Section- 2 (2) of the ICT Act, 2006, "digital signature certificate" means a certificate issued
under section 361.
Section- 5 of the ICT Act, 2006- Authentication of electronic records by digital signature
Any subscriber may authenticate an electronic record by affixing his digital signature. The
authentication of electronic record shall be effected by the use of technology neutral system or
standard authentic signature generating machine or strategy.
Any information or any other matter shall be authenticated by affixing the signature; or any
document shall be authenticated by signature or bear the signature of any person; then,
notwithstanding anything contained in such law, such information or matter is authenticated by
means of digital signature affixed in defined manner or so is the case of any document.
1
36. Issue of certificate.
Section- 8. Use of electronic records and electronic signatures in Government and its
agencies.--(1)
(a) the filing of any form, application or any other document with any office, authority, body or
agency owned or controlled by the appropriate Government in a particular manner;
(b) the issue or grant of any licence, permit, sanction, approval or order by whatever name called
in a particular manner;
(c) the receipt or payment of money in a particular manner; then, notwithstanding anything
contained in such law, filing, issue, grant of the document and receipt and payment of money, as
the case may be, is effected by means of prescribed electronic form.
(2) The manner and format in which such electronic records shall be filed, created or issued and
the manner or methods of payment of any fee or charges for creation and filing shall be fixed by
the rules for fulfilling the purposes of this section.
Section- 17. Secure digital signature.-- (1) If, by application of a security procedure agreed to
by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was-
- (a) unique to the person affixing it;
(c) created in manner or using a means under the sole control of the person affixing; then such
digital signature shall be deemed to be a secure digital signature as per sub-section (2).
(2) Despite the fact of sub-section (1), the digital signature would be invalidated if the electronic
record was altered relating to this very digital signature.
(2) By accepting Digital Signature Certificate the subscriber certifies to all who reasonably rely
on the information contained in the Digital Signature Certificate that--
(a) all representations made by the subscriber to the Certifying Authority and all materials
relevant to the information contained in the Digital Certificate are true; and
(b) all information in the Digital Signature Certificate that is within the knowledge of the
subscriber is true.
All material representations made by the subscriber to a Certifying Authority for purposes of
obtaining a certificate, including all information known to the subscriber and represented in the
Digital Signature Certificate, shall be accurate and complete to the best of the subscriber's
knowledge and belief, regardless of whether such representations are confirmed by the
Certifying Authority.
(2) If the security of Digital Signature Certificate has been compromised by disobeying the rules
in sub-section (1) of this section, the subscriber shall communicate the same without any delay to
the Certifying Authority who has issued the Digital Signature Certificate in an agreed manner.
Any type of electronic signature will be treated as ineffective if the electronic record related to it
is tampered with or amended.
Special considerations
In Bangladesh, several use cases require a traditional signature. In others, such as dealing with
public sector entities, the requirements will vary from case to case.
Bangladesh has no fixed requirements or restrictions for using digital or electronic signatures
when dealing with Government entities. However, restrictions may apply depending on the
particular department’s terms of engagement. Also, under the ICT Act, the Government and its
agencies have no obligation to accept documents in an electronic form.
1. Will;
2. Power of Attorney;
5. Documents which need to be signed before the notary public and/or witnessed.
Digital signatures increase the transparency of online interactions and develop trust between
customers, business partners, and vendors.
Familiarize yourself with the following terms to better understand how digital signatures work:
o Ensure integrity by creating a digital signature of the message using the sender’s
private key. This is done by hashing the message and encrypting the hash value
with their private key. By doing this, any changes to the message will result in a
different hash value.
o Ensure confidentiality by encrypting the entire message with the recipient’s public
key. This means that only the recipient, who is in possession of the corresponding
private key, can read the message.
o Verify the user’s identity using the public key and checking it against a certificate
authority.
• Public key infrastructure (PKI) – PKI consists of the policies, standards, people, and
systems that support the distribution of public keys and the identity validation of
individuals or entities with digital certificates and a certificate authority.
• Digital certificates – Digital certificates are analogous to driver licenses in that their
purpose is to identify the holder of a certificate. Digital certificates contain the public key
of the individual or organization and are digitally signed by a CA. Other information
about the organization, individual, and CA can be included in the certificate as well.
• Pretty Good Privacy (PGP)/Open PGP – PGP/Open PGP is an alternative to PKI. With
PGP/Open PGP, users “trust” other users by signing certificates of people with verifiable
identities. The more interconnected these signatures are, the higher the likelihood of
verifying a particular user on the internet. This concept is called the “Web of Trust.”
Digital signatures work by proving that a digital message or document was not modified—
intentionally or unintentionally—from the time it was signed. Digital signatures do this by
generating a unique hash of the message or document and encrypting it using the sender’s private
key. The hash generated is unique to the message or document, and changing any part of it will
completely change the hash.
Once completed, the message or digital document is digitally signed and sent to the recipient.
The recipient then generates their own hash of the message or digital document and decrypts the
sender’s hash (included in the original message) using the sender’s public key. The recipient
compares the hash they generate against the sender’s decrypted hash; if they match, the message
or digital document has not been modified and the sender is authenticated.
Using digital signatures in conjunction with PKI or PGP strengthens them and reduces the
possible security issues connected to transmitting public keys by validating that the key belongs
to the sender, and verifying the identity of the sender. The security of a digital signature is almost
entirely dependent on how well the private key is protected. Without PGP or PKI, proving
someone’s identity or revoking a compromised key is impossible; this could allow malicious
actors to impersonate someone without any method of confirmation.
Through the use of a trusted third party, digital signatures can be used to identify and verify
individuals and ensure the integrity of the message.
As paperless, online interactions are used more widely, digital signatures can help you secure
and safeguard the integrity of your data. By understanding and using digital signatures, you can
better protect your information, documents, and transactions.
What is Cryptography?
Cryptography is the method of transmitting secured data and communications via few codes so
that only the destined person knows about the actual information that is transmitted. This form of
process intercepts unauthorized accessibility for the data. So, in clear the name itself indicates
that “crypt” refers to “hidden” to “writing”. Encoding of information in cryptography follows
mathematical hypotheses and few calculations described as algorithms. The encoded data is
transmitted so that it makes it difficult to find the original data. These sets of rules are utilized in
the procedures of digital signing, authentication to secure data, cryptographic key development
and to safeguard all your financial transactions. Mostly, cryptography is followed by the
organizations to go with the objectives of:
Privacy – The transmitted data should not be known by external parties except for the intended
individual.
Reliability – the data cannot be modified in storage or transfer between the sender and the
destined receiver having no kind of modification.
Non-repudiation – Once the data is transmitted, the sender has no chance to deny it in the later
phases.
Authentication – Both the sender and receiver need to circumstantiate their own identities about
the transmitted and received data.
Samuel wishes to communicate with his colleague Yary, who is currently residing in another
country. The message contains trade secrets that should not be accessed or seen by any third
party. He sends the message via a public platform such as Skype or WhatsApp. The foremost
aim is to create a secure connection.
Assume Evy, a hacker who has obtained access to the message. Evy can now change or corrupt
the message before it reaches Yary. Evy alters the message that Yary receives. Neither Samuel
nor Yary are aware of the underground work. The outcomes are dreadful.
Now, cryptography can help. It can aid in the security of the connection between Samuel and
Yary.
Now that we understand what cryptography is, let us learn how cryptography aids in the security
of messages.
Samuel first converts a readable message or Plain text into a series of digits using various
cryptographic algorithms to protect the message. He then encrypts the message with a key. The
ciphertext is a term used in cryptography. Samuel uses the internet to send an encrypted message
to Yary. If Evy gains access to it and modifies the message before it reaches Yary. Yary now
requires a key to decrypt Samuel’s message. The message can be converted from cipher text to
plain text using the decryption key.
Because Evy altered the plain text, the result of the decryption will be the original plain text as
an error.
The error indicates that the message has been changed and is no longer the original message. As
a result, encryption is critical for secure communication.
Cipher text- It is the output of the input plain text that gets converted after the encryption
process. Basically, Cipher text is a type of plain text that is unreadable.
Cryptography Types
In cryptography, encryption of the information is classified as three types where those are
discussed below:
Symmetric Key Cryptography – This is also termed as Private or Secret key cryptography.
Here, both the information receiver and the sender make use of a single key to encrypt and
decrypt the message. The frequent kind of cryptography used in this method is AES (Advanced
Encryption System). The approaches implemented through this type are completely streamlined
and quicker too.
Also known as Secret Key Cryptography, private key encryption encrypts data using a single key
that only the sender and receiver know. The secret key must be known by both the sender and the
receiver, but should not be sent across the channel; however, if the hacker obtains the key,
deciphering the message will be easier. When the sender and the receiver meet on the handset,
the key should be addressed. Although this is not an ideal method. Because the key remains the
same, it is simpler to deliver a message to a certain receiver. The data encryption framework
(DES Algorithm) is the most widely used symmetric key system.
For instance, Tom is sending a message to Mary that he does not want anyone else to see. He’d
like to encrypt his message. That is simply because Tom and Mary exchange the same key. They
will use the same key for encrypting and decrypting. Here’s how it works: First, Tom encrypts
his signal with his key. His message has now been encrypted and scrambled. It can’t be read by
anyone. When Mary receives the encrypted message, she decrypts it with the same key so she
can read it in plaintext.
• Block
• Block cipher
• RC2
• IDEA
• Blowfish
• Stream cipher
This is also termed as Public-key cryptography. It follows a varied and protected method in the
transmission of information. Using a couple of keys, both the sender and receiver go with
encryption and decryption processes. A private key is stored with each person and the public key
is shared across the network so that a message can be transmitted through public keys. The
frequent kind of cryptography used in this method is RSA. The public key method is more secure
than that of a private key. Asymmetric key cryptography, also known as public-key cryptography,
consists of two keys, a private key, which is used by the receiver, and a public key, which is announced
to the public. Two different keys are used in this method to encrypt and decrypt the data. These two
distinct keys are mathematically linked. They are sold in pairs. The public key is accessible to anyone,
whereas the private key is only accessible to the person who generates these two keys.
For example, Bob wants to send an encrypted message to Alice, and they agree to encrypt his
message using public-key encryption. The receiver initiates public key encryption to encrypt the
sender’s message. The receiver, not the sender, initiates the public key method to encrypt the
sender’s message. Everyone has access to the public key. The receiver, Alice, is the only one
who has access to the private key. The following is how it works:
Step 1: Alice generates two keys: one public and one private. Alice stores the public key on a
public key server that anyone can access.
Although Alice’s private key can confirm that no one read or changed the document while it was
in transit, it cannot confirm the sender. Because Alice’s public key is available to the public,
anyone can use it to encrypt his document and send it to Alice while posing as Bob. Digital
signature is another technique that is required to prove the sender.
• RSA
• DSA
• PKCs
Hash Function
Taking the arbitrary length of the message as input and delivering a fixed length of the output is
the algorithm followed by a hash function. It is also termed as a mathematical equation by taking
numerical values as input and produce the hash message. This method will not need any kind of
key as it functions in a one-way scenario. There are various rounds of hashing operations and
every round considers input as an array of the recent block and generates last round activity as
output. Few of the functionalities of the hash are:
• RIPEMD
• Whirlpool
Certifying authorities (CA) are important entity in the Public Key Infrastructure. An example can
be given to explain the role of CA. If A (the sender) and B (the receiver) are attempting to
engage in an online transaction, B needs an independent affirmation that A's message is actually
from A before B can have faith that A's public key actually belongs to A. It is possible that a
perpetrator could have sent B the public key, contending that it belongs to A when in fact it does
not.
Accordingly, a reliable third party- the CA - must be available to register the public keys of the
parties and to guarantee the accuracy of the identification of the parties
The government may appoint Controller, Deputy Controller and Assistant Controller of
Certifying Authorities. The Controller is the highest authority to supervise and validate the CAs.
The Controller is responsible to specify the rules and methods under which CAs will function.
It will establish databases of disclosure issued by Certifying
Authorities and perform all other functions in order to ascertain the system of Public Key
Infrastructure work properly.
The Controller has authority to recognize foreign CAs by following rules established under the
Act. It will act as repository of all Certificates issued.
a. They will make sure the hardware and software they use is safe from intrusion and misuse.
c. They will adhere to security procedures to ensure that the secrecy and privacy of the digital
signature are assured.
e. They will make sure that every employee and otherwise engaged by it complies the rules and
regulations.