Digital Signature
Digital Signature
Digital Signature
net/publication/228226336
Digital Signature: Nature & Scope Under the IT Act, 2000 - Some Reflections
CITATIONS READS
0 14,617
1 author:
SEE PROFILE
All content following this page was uploaded by Vijaykumar Shrikrushna Chowbe on 14 October 2021.
Abstract :
This article has attempted to understand the nature,
meaning and scope of ‘digital signature’. In turn, this article
has also focused on the mechanism of affixing the ‘digital
signature’ to electronic record. Signature signify
authentication, verification and non-repudiation, but in
electronic environment this mechanism happens in altogether
different sense as compare to paper-based world because
paper-based and paper-less world are different in its context
and contents.
The attempt is to understand the effect and impact of
‘digital signature’ in the cyberspace, its techno-legal effect and
system if issuing, granting and maintaining the ‘Digital
Signature’ in India. The limitation of this article is the legal
system it focused upon, i.e. Indian Legal system. This article
has understand the effect and impact of ‘digital signature’ in
general sense, but keeping the Information Technology Act,
2000 [Indian piece of legislation dealing with Information
Technology], thus context different to that effect.
Introduction
1 Head, [Associate Professor], Post Graduate Teaching Department of Law, Sant Gadge Baba
Amravati University, Amravati [Maharashtra], India. For suggestion and further
discussion, visit at – vijuchowbe@gmail.com [09422157157]
2 This list is not exhaustive. For e.g. Restatement (Second) of Contracts notes another function, termed
the “deterrent function”, which seeks to “Discourage transactions of doubtful utility.” Restatement
(Second) of Contracts 72 Comment c(1981). Professor Perillo notes earmarking of intent,
clarification, managerial efficiency, publicity, education, as well as taxation and regulation as
functions served by the statute of frauds. Joseph M. Perillo, the Statute of Frauds in the Light of
the Functions and Dysfunctions of Form, 43 Fordham L. Rev. 39, 48-64.
3 See, Restatement (Second) of Contracts, statutory note preceding S. 110 (1982) (Summarizing
purpose of the statute of frauds, which includes a signature requirement): Lon L. Fuller,
Consideration and Form, 41 Colum. L. Rev. 799, 800 (1941); 6 Jeremy Bentham, The Works of
Jeremy Bentham 508-85 (Bowring Ed. 1962) (1839) (Bentham called forms serving evidentiary
functions “preappointed [i.e., made in advance] evidence”). A handwritten signature creates
probative evidence in part because of the chemical properties of ink that make it adhere to paper,
and because handwriting style is quite unique to the signer. Signed includes any symbol executed
or adopted by a party with present intention to authenticate a writing.
201
4 John Austin, Lectures on jurisprudence 939-44 (44th Ed. 1873); Restatement (Second) of Contracts
S. 72 comment c (1982) and statutory note preceding S. 110 (1982) (what is here termed a
“Ceremonial” function is termed a “cautionary” function in the Restatement);
5 See, Model law on Electronic Commerce, United National Commission on International Trade Law
(UNCITRAL), 29th Session, Art. 7 (1) at 3, Doc., A/CN.9/XXIX.CRP.1/Add. 13 (1996) (“Where a
law requires a signature of a person, that requirement is met in relation to a data message if: (a) a
method is used to identify that person and to indicate that person’s approval of the information
contained in the data message….”); Draft Model Law on Legal Aspects of Electronic Data
Interchange (EDI) and Related Means of Data Communication, United Nationals Commission on
International Trade Law (UNCITRAL), 28th Session, Art. 6, at 44, U.N. Doc. A/CN./9/406 (1994).
For example, a signature on a written contract customarily indicates the signer’s assent. A
signature on the back of a check is customarily taken s an endorsement. See U.C.C. S. 3-204
(1990).
6 Analogizing the form of a legal transaction to minting of coins, which serves to make their metal
content and weight apparent without further examination. The notion of clarity and finality provide
by a form are largely predicated on the fact that the form provides good evidence. The basic
premise of the efficiency and logistical function is that a signed, written document is such a good
indicator of what the transaction is, that the transaction should be considered to be as the signed
document says. The moment of signing the document thus becomes decision.
7 See, e.g. U.C.C. S. 3-401 (1990) (A Person is not liable on an instrument unless the person signed
it); See generally U.C.C. S. 3-104 (1990) (requirements for negotiability).
202
Digital Signature
8 See for details, S 20 of the Information Technology Act, 2000 which runs as under
S. 20. : Controller to act as repository.
(1) The Controller shall be the repository of all Digital Signature Certificates issued
under this Act.
(2) The Controller shall—
203
Digital Signature
(a) make use of hardware, software and procedures that are secure its {correct after
verification} intrusion and misuse;
(b) observe such other standards as may be prescribed by the Central Government, to
ensure that the secrecy and security of the digital signatures are assured.
(3) The Controller shall maintain a computerised data base of all public keys in such a
manner that such data base and the public keys are available to any member of the
public.
204
Digital Signature
205
Digital Signature
respect in the medium play vital role for an individual to chose the
medium. It is only because of the danger of being prospective violation
of privacy, the net is treated is most dangerous zone where the ‘privacy’
has involved as a basic issue. It should be noted down that the concept
of ‘privacy’ discussed here is not from point of view of any right to
privacy, but is should be understood as a part of all transactions,
dealing, communication that is used to be carried out by an individual
with a feeling to be maintained by the concept of ‘privacy’. It can be
simply understood by taking an example of ‘E-mails’ and ‘chat rooms’.
Nobody assure that how so far these ‘E-mails’ and ‘chat-rooms’ are safe
to safeguard the privacy of an individual. The ‘privacy’ is at stake in
digital environment in two different ways.
206
Digital Signature
207
Digital Signature
208
Digital Signature
209
Digital Signature
Encryption
Decryption
210
Digital Signature
9 Of course, the holder of the private key may choose to divulge it, or may lose control of it (often
called ‘compromise’), and thereby make forgery possible. The Guidelines seek to address this
problem in two ways, (1) by requiring the subscriber, who holds the private key, to use a degree of
care in its safekeeping, and (2) enabling the subscriber to disassociate himself from the key by
temporarily suspending or permanently revoking his certificate and publishing these actions in a
“certificate revocation list.” or “CRL”. A verity of methods is available for securing the private
key. The safer methods store the private key in a “cryptographic token” (one example is a “smart
card”) which executes the signature programme within an internal micro processing chip, so that
the private key is never divulged outside the token and does not pass into the main memory or
processor of the signer’s computer. The signer must typically present to the token some
authenticating information, such as a password, pass phrase, or personal identification number, for
the token to run a process requiring access to the private key. In addition, this token must be
physically produced, and biometric authentication such as fingerprints or retinal scan can assure the
physical presence of the token’s authorized holder. There are also software-based schemes for
protecting the security of the private key, generally less secure than hardware schemes, but
providing adequate security for many types of applications.
211
Digital Signature
record. Once the electronic record is encrypted with the help of private
key it scrambled the electronic record in such a clever ways so that
putting it back to its original form is almost all impossible. Even the
holder of private key now cannot put the electronic record into original
form. Now only viewing this record is possible with the help of
corresponding public key. The mechanism of private key is that it leads
every time to the same result for same electronic record. Thus once any
electronic record is encrypted with the help of private key the holder of
private key cannot deny that it is encrypted with the help of his private
key.
The second key in the set is public key which is used to verify
electronic record and available and known to the public at large.
Anybody who wants to verify the content of the electronic record
encrypted with the help of private key, can use corresponding public
key to verify the electronic record, however, only verification of
electronic record is possible with the help of public key and no
alteration, modification, change or tampering is possible furthermore
once it is transformed into hash result by applying private key. Both
these keys are so related with each other that only the electronic record
encrypted by private key can be open by its corresponding public key
only. Thus use of this asymmetric pair of keys for encryption and
decryption of electronic records serve following purposes :
For originator :
212
Digital Signature
For recipient :
213
Digital Signature
214
Digital Signature
10 See, the information Technology (Certifying Authorities) Rules, 2000 Schedule V [Glossary] which
define key pair as, ‘KEY PAIR – In an asymmetric crypto system, means a private key and its
215
Digital Signature
mathematically related public key, which are so related that the public key can verify a digital
signature created by the private key.
216
Digital Signature
Hash Result
Enveloped Electronic
record
Electronic Hash Function executed with the
Record help of Private key
Enveloped Electronic
record
Can be opened and
Electronic verified by public key
Record
Fig 3 : Showing how the “Hash Function” executed by ‘private key’ to yield “Hash
Result”. The “Hash Result is nothing but the transformed form of ‘Electronic Record” which
get enveloped and only can be viewed but can not be modified any way after, and it is
impossible to get back the original “Electronic Record” from the “Hash Result”.
The private key remain secrete with the user and nobody is aware
about it, while public key is freely distributed for the public which can
be used to decrypt and verify the electronic records encrypted by
person. While affixing the digital signature to any electronic record, the
originator (subscriber of Digital Signature Certificate) applies his
217
Digital Signature
(ii). that two electronic records can produce the same hash
result using the algorithm. And
This mechanism also ensure that the set of private key and the
public key are unique to the subscriber and constitute a functioning key
pair. 11 The keys (also) have the property that it is computationally not
feasible to discover one of the key pairs merely by knowing the
elements of the other key. 12
11 See, for detail, S.3 of the Information Technology Act, 2000 (21 of 2000)
12 http://www.state.co.us/gov_dir/gss/cec3/colo_rules.htm visited on 20.10.2006
218
Digital Signature
13 In the first phase of its operation the services being offered are government to government. NIC
offers four distinct classes of digital certification services, classes 0-3 for NICNET users within the
government. For all its subscribers it issues class 2 digital IDs. These digital IDs are used to identify
the subscriber on the net and are legally valid as they are backed by the Information Technology
Act, 2000.
14 Preamble of the Information Technology Act, 2000 runs as follows :
An Act to provide legal recognition for transactions carried out by means of electronic
data interchange and other means of electronic communication, commonly referred
to as "electronic commerce", which involve the use of alternatives to paper-based
methods of communication and storage of information, to facilitate electronic filing
of documents with the Government agencies and further to amend the Indian Penal
Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and
the Reserve Bank of India Act, 1934 and for matters connected therewith or
incidental thereto.
WHEREAS the General Assembly of the United Nations by resolution A/RES/51/162,
dated the 30th January, 1997 has adopted the Model Law on Electronic Commerce
adopted by the United Nations Commission on International Trade Law;
AND WHEREAS the said resolution recommends inter alia that all States give
favourable consideration to the said Model Law when they enact or revise their laws,
in view of the need for uniformity of the law applicable to alternatives to paper-cased
methods of communication and storage of information;
219
Digital Signature
The Act has set forth the objective to provide legal recognition for
transactions carried out by means of electronic data interchange. At the
same time, the authentication, integration and non-repudiation of
electronic record is equally important. But more important than
anything else is to provide a provision that would create a sense of
responsible and assurance about the mechanism. The genuineness and
of medium is equally important than creation of medium, and the
information technology in general and digital signature in particular
has attempted to bring authentication in this medium. 15
AND WHEREAS it is considered necessary to give effect to the said resolution and to
promote efficient delivery of Government services by means of reliable electronic
records.
15 See, State of Punjab and Ors. Vs. Amritsar Beverages Ltd. and Ors. Civil Appeal No. 3419 of 2006
(Arising out of SLP (Civil) Nos. 10371-10374 of 2004) Decided On: 08.08.2006 [para 7] p. 3488.
The Supreme Court observed,
220
Digital Signature
We may notice some recent amendments in this behalf Section 464 of the Indian Penal
Code deals with the inclusion of the digital signatures. Sections 29, 167, 172, 192 and
463 of the Indian Penal Code have been amended to include electronics documents
within the definition of Page 3489 'documents'. Section 63 of the Evidence Act has
been amended to include admissibility of computer outputs in the media, paper,
optical or magnetic form. Section 73A prescribes procedures for verification of digital
signatures. Sections 85A and 85B of the Evidence Act raise a presumption as regards
electronic contracts, electronic records, digital signature certificates and electronic
messages.
[para 8]
16 This shall be borne in mind that the amendment brought into effect by the Information Technology
Act, 2000 in Evidence Act, 1882 has also create strong presumption in favour of electronic
contracts, electronic records, digital signature certificates and electronic messages.
221
Digital Signature
222
Digital Signature
Thus, what exactly the ‘digital signature’ stands for has not been
defined by the Act. It simply point out that ‘digital signature’ means
authentication of electronic record by subscriber by and in accordance
of the procedure laid down by Chapter II, S. 3 of the Act. For reference
it is essential to have a look to Section 3 of the Act which runs as under :
223
Digital Signature
(4) The private key and the public key are unique
to the subscriber and constitute a functioning key pair.
Ss. 3 (1) of the Act explain the category of person who can
authenticate the electronic record. It provides that the ‘subscriber’ can
authentication any electronic record by affixing his digital signature to
it. This sub section empowers only to the subscriber, and not any general
person, the capacity to authenticate the electronic record. The Act also
defined ‘subscriber’ vide S. 2 (1) (zg) as :
224
Digital Signature
17 Therefore, the term ‘verify’ has also been defined by the Act which prescribed the meaning and
scope as follows :
S. 2 (1) (zh) "verify" in relation to a digital signature, electronic record or public key,
with its grammatical variations and cognate expressions means to determine
whether—
(a) the initial electronic record was affixed with the digital signature by the use of
private key corresponding to the public key of the subscriber;
(b) the initial electronic record is retained intact or has been altered since such electronic
record was so affixed with the digital signature.
225
Digital Signature
Though traditionally, only one key pair use to encrypt the record
and same key pair use to decrypt it. But for securing the record and
unable its reversibility, two different key pairs are used in which one
key pair modify the record and other key pair can only verify it, but
does not able to alter, change its content.
18 S. 2 (1) (f) of the Information Technology Act, 2000 which define "asymmetric crypto system" as
follows:
"asymmetric crypto system" means a system of a secure key pair consisting of a private
key for creating a digital signature and a public key to verify the digital signature;
19 S. 3 (4) of the Information Technology Act, 2000. See also, Duggal Pavan, Cyber Law – The Indian
Perspective, Saakshar Law Publications New Delhi, 2nd Ed. 2004, pg. 65
20 S. 2 (1) (x) of the Information Technology Act, 2000 which define “Key pair” as follows :
"key pair", in an asymmetric crypto system, means a private key and its mathematically
related public key, which are so related that the public key can verify a digital
signature created by the private key;
226
Digital Signature
mapping use to envelop and translate one sequence of bits into another
work on it to generate “hash result”. The hash function is one which
whenever works upon the same electronic record yield the same hash
result every time. However, the legal provision prescribe with regard
to hash function that –
(ii) The hash function is to yield same hash result every time
whenever executed with same electronic record as it input
(iii) This hash function must bear the feature that deriving or
reconstruction of original record from hash result shall not
be possible
(iv) No two electronic records yield same hash result with hash
function
227
Digital Signature
that the document is one which he had created. But if two hash results
differ, he can very well take plea that the input is different. The same
methodology can be used by forensic lab to verify that whether the
same hash result yield second time or not. They can check it with the
alleged electronic record by comparison.
The third condition laid down by the Act is due to the reasons
that once the digital signature affixed to the electronic record, it get
enveloped and wrapped by the hash function. Now it is only possible
that one can only verify it but cannot modify. Once the system ensure
this feature, it give a legal presumption that once the electronic record
bears digital signature, it is neither modified, changed, altered or
tampered by anybody. Even the subscriber cannot able to get original
record by any means. Therefore, reliability of electronic record can be
ensured.
The last condition ensures that no two results from two different
inputs shall yield after execution by hash function. This is because if
the two hash result will be identical despite the inputs were different,
its authenticity will at stake. Thus for different input, different hash
result must be yield and no two hash result shall be identical if the
input is different. These conditions can ensure and strengthen the
reliability of mechanism and chances of creeping up of loopholes.
228
Digital Signature
Controller of
Certifying Authority
Subscriber M
Subscriber Z
Subscriber N
Subscriber C
Subscriber A
Subscriber B
Subscriber X
Subscriber Y
Fig 4 : Showing hierarchical set up of Controller of CA
Note : Subscribers are not the constituent part of the office of CCA
229
Digital Signature
(3) The Deputy Controllers and Assistant Controllers shall perform the functions
assigned to them by the Controller under the general superintendence and control of
the Controller.
(4) The qualifications, experience and terms and conditions of service of Controller,
Deputy Controllers and Assistant Controllers shall be such as may be prescribed by
the Central Government.
(5) The Head Office and Branch Office of the office of the Controller shall be at such
places as the Central Government may specify, and these may be established at such
places as the Central Government may think fit.
(6) There shall be a seal of the Office of the Controller.
230
Digital Signature
22 Id. S. 18
231
Digital Signature
The Act has also specified the scope for the recognition of foreign
Certifying Authorities. For this purpose, the act has prescribed that
Controller may with prior approval of Central Government and subject
to such conditions and restrictions as may be specified by regulations,
and by notification in the Official Gazette, recognise any foreign
Certifying Authority as a Certifying Authority for the purposes of the
Act. In this case, if the foreign Certifying Authority would given
recognition, the ‘Digital Signature Certificate’ issued by such Certifying
23 For e.g. First digital Contract Note authenticated by digital signature had been issued by Mr. K.N.
Gupta, the first Controller of Certifying Authorities, Government of India, has issued the first
licence to “Safe Script” to act as a Certifying Authority. Another persons who were in line for the
issue of licence were (1) RBI Affiliate, Hyderabad (2) Institution of Development Research and
Banking Technology and, (3) National Informatics Centre et. The “Safe Script” had issued a digital
signature certificate in the name of “ICICIDIRECT.COM”, Mumbai. On March 27, 2002 the
subscriber “ICICIDIRECT.COM”, became the first firm to issue a Digitally Signed Contract Note
(DSCN) to its clients [The Economic Times, Delhi Ed. 29.03.2002 Pg. 5]. The
ICICIDIRECT.COM used to issue contract notes for about 22,000 transactions carried out per day.
They are physically mailed to the investors. With the introduction of the new system, the investors
will investors will instantly receive a legally valid contract note electronically. A report says that
the new service is expected to save around Rs. 6 crores which were payable to the brokers.
232
Digital Signature
233
Digital Signature
26 Ibid.
27 Id. S. 68
28 Id. S. 30
234
Digital Signature
29 Id. S. 21
30 Rule 4 of the Information Technology (Certifying Authority) Regulations, 2001 has prescribed the
standards followed by the Certifying Authority for carrying out its functions.
31 See, S. 21 of the Information Technology Act, 2000
235
Digital Signature
This is to be noted down that the ‘electronic signature’ has now been
inserted in the legal statutes in India. It has been now intended to be
incorporated in the Information Technology [Amendment] Act, 2009,
however it is yet not been started to be incorporated. The amendment has
32 Id. S. 23
33 Id. S. 25
236
Digital Signature
already been passed in February 2009. It will be interesting to see that how
Indian legal system switch over to this imporved form of technology which
was in demand from the very beginning. It is sure that the ‘electronic
signature’ will definitely prove more secure and safe form of affixing the
signature to the electronic data and it will provide better chances to the maker
and receiver of electronic data/record to interact on the point of
authentication, verification and non-repudiation.
1.16. Sum up
237