Home
Banner Details

Digital Signature: A Tool for Information Security


Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed.

 

The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.


EOI

EXPRESSION OF INTEREST (EOI) Title of Consulting Service: EOI/01/075/76 Method of Consulting Service: National Project Name: Making 6 Different Government…

2019-01-08

Request for Express of Intrest

Request for Expression of Interest Government of Nepal (GON) Name of Employer: Office of Controller of Certification Date: 2075/09/24 Name…

2019-01-08

Major works completion From falgun 3- Ashad

 फाल्गुन ३, २०७४ देखि ०७५ आषाढ मसान्त सम्म सम्पन्न गरिएको प्रमुख कार्यहरू: ६ वटा विभिन्न सरकारी निकायहरूका सूचना…

2018-07-30

Read More

Message from Controller

Office of Controller of Certification is formed under the ministry of Science, Technology and Environment with a view to implement Electronic Transaction Act 2063 and implementing digital signature in Nepal,…

Mr. Deepak Kumar Shrestha
Read More

Suchana Adhikaari

Mr.Anil Kumar Dutta
Read More

Acts and Regulation : DOWNLOAD