Home
Banner Details

Digital Signature: A Tool for Information Security


Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed.

 

The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.


Invitation for Bids for supply ,delivery and implementation of cloud based software.

                                       …

2017-02-28

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre Invitation for Bids…

2015-06-24

Message from Controller

Office of Controller of Certification is formed under the ministry of Science, Technology and Environment with a view to implement Electronic Transaction Act 2063 and implementing digital signature in Nepal, regulations and policy responses for the development of ICT sector in the country as well as harnessing these technologies to meet key developmental challenges including those relating to governance reform…

Mr. Deepak Kumar Shrestha
Read More

Acts and Regulation : DOWNLOAD