Home
Banner Details

Digital Signature: A Tool for Information Security


Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed.

 

The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.


Essay Competition

निजामती सेवा दिवस २०७४ को सन्दर्भमा निबन्ध प्रतियोगिताको आह्वान १. निबन्धको शिर्षक: "संघियताको कार्यान्वयनमा निजामती सेवाको भूमिका" २. सहभागी: निजामती…

2017-08-15

Invitation for Bids for supply ,delivery and implementation of cloud based software.

                                       …

2017-02-28

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre Invitation for Bids…

2015-06-24

Message from Controller

Office of Controller of Certification is formed under the ministry of Science, Technology and Environment with a view to implement Electronic Transaction Act 2063 and implementing digital signature in Nepal,…

Mr. Deepak Kumar Shrestha
Read More

Suchana Adhikaari

Mr.Anil Kumar Dutta
Read More

Acts and Regulation : DOWNLOAD