Let's Build a Responsible Cyber Society


Has MCIT Killed the Digital Signature System in India?
.

 

It may look strange that the question "Has MCIT killed the Digital Signature System in India?" is being raised at a time when MCIT (Ministry of Communication and Information Technology) may even claim to have taken some steps to promote  use of digital signatures.

Hindu of 14th May 2005 carried an advertisement from Indian Railways about the use of Digital Signatures in e-procurement procedures and giving out the URL s of SafeScrypt, TCS, MTNL and (n)code, urged the interested vendors to equip themselves with digital signatures.

I do not recall another such open promotion of digital signatures even by the Certifying Authorities themselves. This indicates that at last the Government has realized that it cannot be promoting non cyber law compliant systems to proliferate in the e-governance systems as it has been a practice in all these five years when ITA-2000 has been in force.

Despite these positive developments, it is necessary to point out certain developments which certainly give scope for raising the question cited above.

Sections 14, 15 and 16 of ITA-2000 had defined what was called a Secure Electronic Record, Secure Digital Signature and Security Procedure. These sections have always been an enigma since Section 15 defining Secure Digital Signature was fulfilled by the ordinary digital signature itself and hence the difference sought to be made in this regard between the secure digital signature and the other digital signature was not perceptible. Sections 14 and 16 were considered enabling provisions.

These Sections are reproduced below for reference.

  14   Secure Electronic Record  
     

Where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification.
 


 
  15   Secure Digital Signature  
     

If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the lime it was affixed, was -
 

(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c)

created in a manner or using a means under the exclusive control of the  subscriber and is linked to the electronic record to which it relates in such   a manner that if the electronic record was altered the digital signature would   be invalidated, then such digital signature shall be deemed to be a secure digital signature.


 
  16   Security procedure  
     

The Central Government shall for the purposes of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including
 

(a) the nature of the transaction;
(b)

the level of sophistication of the parties with reference to their   technological capacity;

(c) the volume of similar transactions engaged in by other parties;
(d) the availability of alternatives offered to but rejected by any party;
(e) the cost of alternative procedures; and
(f)

the procedures in general use for similar types of transactions or  communications.

However, through a notification dated October 29 2004, the MCIT sought to bring in the distinction between the Secure Digital Signature and the other Digital Signature by the following notification.

Extract from Notification Dated October 29, 2004

Secure digital signature. - A digital signature shall be deemed to be a secure digital signature for the purposes of the Act if the following procedure has been applied to it, namely:-

(a) that the smart card or hardware token, as the case may be, with cryptographic module in it, is used to create the key pair;

(b) that the private key used to create the digital signature always remains in the smart card or hardware token as the case may be;

(c) that the hash of the content to be signed is taken from the host system to the smart card or hardware token and the private key is used to create the digital signature and the signed hash is returned to the host system;

(d) that the information contained in the smart card or hardware token, as the case may be, is solely under the control of the person who is purported to have created the digital signature;

(e) that the digital signature can be verified by using the public key listed in the Digital Signature Certificate issued to that person;

(f) that the standards referred to in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 have been complied with, in so far as they relate to the creation, storage and transmission of the digital signature; and

(g) that the digital signature is linked to the electronic record in such a manner that if the electronic record was altered the digital signature would be invalidated.

On the face of it this appears to be a very reasonable provision aimed at introducing more security in to the system.

However, MCIT appears to have lost sight of the fact that along with ITA-2000, certain amendments were made to the Indian Evidence Act 1872 where in evidentiary value was ascribed to digital signatures. The notification adversely affects the status of digitally signed electronic documents in terms of their evidentiary value.

The newly introduced Section 67A of the Indian Evidence Act stated:

67A: Proof as to digital Signature: Except in the case of a secure digital signature, if the digital signature of any subscriber is alleged to an electronic record, the fact that such digital signature is the digital signature of the subscriber must  be proved.

Under this section therefore, all non-secure digital signatures need to be proved with the person submitting such a document also ensuring at his cost and responsibility verification of the digital signature as per Section 73A of the Indian Evidence Act which requires "Some other person to apply the public key listed in the digital signature certificate and verify the digital signature purported to have been affixed by that person".

I would request the MCIT to clarify

Whether all Certifying Authorities and the Controller are maintaining a repository of digital certificates issued and revoked?

Whether the revocation list published are current? and Complete?

If the repository and revocation lists are incomplete, not updated and therefore unreliable, is there any means by which a Court can verify the digital signature?

What could be the additional cost for the person producing the digitally signed document in a court of law in arranging the verification?

How do we handle the digital signatures using foreign digital certificates?

How should the document owner (recipient of a message in the context of evidence)  prove and the court accept that a document containing a digital signature before it has in fact been created using a "Secure Procedure" and not otherwise?

The cost of acquiring a digital certificate even under the present non-secure system is considered high for the common man. Under the circumstances, has the MCIT estimated what would be the cost of the "Secure Digital Signature System" for the consumer who has to now acquire either a smart card with smart card reader or the cryptographic key?

Has MCIT verified if it is possible to use the cryptographic key in a normal corporate network where we are moving to a "Disk Less" dumb node system for various reasons. Are USB drives and smart card readers used in all places to enable use of secure digital signatures?

Are all e-governance systems equipped to use secure digital signatures? and if not what would be the cost of such transition?

Lastly, are all employees of the MCIT equipped to use secure digital signatures?..If not how do we expect others and common men to start using the system since it would be the only system having evidentiary value without further proof?

It appears that even before the system of digital signatures can be popularized amongst the common man, MCIT has taken steps to upgrade the system to a "Secure Digital Signature system" and in the bargain made it difficult for the existing system to even take root.

I hope the above issues have been taken note of by MCIT and we will receive a suitable clarification.

Naavi

May 14, 2005

(A copy of this article is being sent to the Minister of Communications and Information technology as well as the Secretary of MCIT and the Controller of Certifying Authorities. In case any reply is received, it will be made available on the site).

Comments are welcome



For Structured Online Courses in Cyber laws, Visit Cyber Law College.com

 

Back To Naavi.org