Home >>Information Security Cyber Law Tutorial >Digital & Electronic Signatures

Digital & Electronic Signatures

Digital Signature

A digital signature is a technique to verify a digital message or document's validity. A valid digital signature provides the recipient with the guarantee that a known sender has produced the message, so that the sender will not deny having sent the message. For software distribution, financial transactions, and in other situations where there is a possibility of forgery, digital signatures are often used.

Electronic Signature

Either an electronic signature or an e-signature means that the one who created it is a person who demands that a message be created.

It is possible to describe a signature as an individual-related schematic document. A signature on a document is a sign that the purposes recorded in the document are approved by the individual. Digital seals are also required for another layer of authentication and security in many balance and job. Digital seals and signatures are the same as stamped seals and handwritten signatures.

Digital Signature to Electronic Signature

The term specified in the old I.T. was Digital Signature. 2000 Act. The term specified by the amended act (I.T. Act, 2008) is Electronic Signature. Electronic Signature is a wider concept than Digital Signature. The verification of electronic records by affixing electronic documents is provided for in Section 3 of the Act.

As amended, electronic record verification through electronic signature or electronic authentication technique is considered to be reliable.

Electronic authentication and signature methods can be divided into the following categories, according to the United Nations Commission on International Trade Law (UNCITRAL):

  • Those that are based on user or recipient information, such as passwords, personal identification numbers (PINs), etc.
  • These are based on the user's physical characteristics , i.e., biometrics.
  • These are focused on the user's possession of an object, i.e. codes or other information stored on a magnetic card.
  • Types of authentication and signature methods that may also be used to signify the originator of an electronic correspondence (such as a handwritten signature facsimile or a name typed at the bottom of an electronic message) without falling into any of the above categories.

The following technologies are currently in use, according to the UNCITRAL MODEL LAW on Electronic Signatures −

Inside a public key infrastructure ( PKI) Digital Signature

  • Biometric Device
  • PINs
  • Passwords With
  • Handwritten signature scanned
  • Digital Pen's signature
  • Click on the "OK" or "I Accept" or "I Agree" .