Home
Banner Details

Digital Signature: A Tool for Information Security


Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed.

 

The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.


Major works completion From falgun 3- Ashad

 फाल्गुन ३, २०७४ देखि ०७५ आषाढ मसान्त सम्म सम्पन्न गरिएको प्रमुख कार्यहरू: ६ वटा विभिन्न सरकारी निकायहरूका सूचना…

2018-07-30

Major Works completion from Falgun 3,2074-Ashad

 फाल्गुन ३, २०७४ देखि ०७५ आषाढ मसान्त सम्म सम्पन्न गरिएको प्रमुख कार्यहरू: ६ वटा विभिन्न सरकारी निकायहरूका सूचना…

2018-07-29

Essay Competition

निजामती सेवा दिवस २०७४ को सन्दर्भमा निबन्ध प्रतियोगिताको आह्वान १. निबन्धको शिर्षक: "संघियताको कार्यान्वयनमा निजामती सेवाको भूमिका" २. सहभागी: निजामती…

2017-08-15

Read More

Message from Controller

Office of Controller of Certification is formed under the ministry of Science, Technology and Environment with a view to implement Electronic Transaction Act 2063 and implementing digital signature in Nepal,…

Mr. Deepak Kumar Shrestha
Read More

Suchana Adhikaari

Mr.Anil Kumar Dutta
Read More

Acts and Regulation : DOWNLOAD