Page 19 - ICT Nepal News Issue 01
P. 19

(OCC)  had initiated  the  digital signature. Even
        works related  to this    the Government  Root CA
        under the Electronic      has not been integrated
        Transactions  Act-2063 BS  with Global  CA and is not
        and Regulations-2064  BS  trusted in browsers  as
        with an objective of making  Root CA, Nepal Root CA
        electron ic tra nsactions  is kept as Trusted  Root
        Secure and reliable.  The  CA manually in present
        OCC has given permission  internal context.  DSC  is
        to Radiant lnfo-tech  Nepal  being implemented  in
        Company to issue digital  Pu blic-Private Partnership
        signatures.               (PPP)  model where still it
           ln context of Nepal,   lacks awareness.  Special
        PKI enabled application   awareness  programs
        is not found in most      should be conducted       Digita I Signatu re Certifi cate
        of the government         for better  information   generators  are not only
        agencies. Many private    about  DS and relationship  focusing  on generating    Using digital
        as well as government     between  both public      digital signature and
        organizations  i.e. banks  and private sectors.     certificate  but also appeals     sig natu re
        and other business firms  Government  bodies        all government  bodies  and
        uses different  a pplications  like lnland Revenue  individuals  to use digital    saves time,
        like Pumori, Finacle, etc.  Department  (lRD),  OCR,  signatures  to make "Digital
        where  DSC are not trusted  Nepal Rastra  Bank  (NRB)  Nepal".                     money and
        from the root which       and other regulatory         Apart from all the
        doesn't  makes even the   bodies should help and    problems and threats          environment
        top level of private as well  initiate in the implication  government  bodies
        as government  agencies   of DSC nationally. Nepal  have been facing for
        feel their ownership of   Certifying Company, the   implementing  DSC




               Encryption with Digital Signature



               ln many digital                                                       spoof identity of sender
                                                                                     and sent that data to
            communications,  it is
            desirable  to exchange                                                   third  party. Hence, this
                                                 Erxrwli*rt usiug                    method  is not preferred.
            an encrypted  messages                                      Encrypted Sata
                                               gerewr:{s  puhlic  keY        +
            than  plaintext to achieve                                               The process of encryPt-
                                                                        Digl,tal Sgnature
            confi dentiality.  ln public                                             then-sign is more reliable
            key encryption  scheme,                  lla*\dr:q                       and widely adopted.
            a public (encryption)  key               Funrl,i*n                       This is depicted in the
            of sender  is available  in                                              following illustration  -
            open domain, and hence                                 *16;*al *ignalure  with
            anyone can spoof his                                   Sendels  prlvet* key  The receiver  after
            identity and send any                                                    receiving  the encrypted
            encrypted  message  to  authentication  and non-  requirement.  There    data and signature on it,
            the receiver.           repudiation.             are two possibilities,  first verifies the signature
               This makes it essential  This can archived    sign-then-encrypt  and  using sender's  public
            for users employing  PKC  by combining digital   encrypt-then-sign.      key. After ensuring  the
            for encryption  to seek  signatures  with          Howeve6  the crYPto   validity  of the signature,
            digital signatures  along  encryption  scheme.   system based on sign-   he then retrieves  the
            with encrypted  data to  Let us briefly discuss  then-encrypt  can be    data through  decryPtion
            be assured of message   how to achieve this      exploited  by receiver  to  using his private key.




                                               [19)  IftI NEPAL  (]anuary  201,7)
   14   15   16   17   18   19   20   21   22   23   24