Project Report
On 
 
       E-Commerce and Digital Signature 
 
     Submitted Ior Partial FulIillment Ior the Award oI the Degree oI  
 
 MASTER OF BUSINESS ADMINISTRATION 
(MBA) 
 
UNDER THE SUPERVISION OF 
MS. Ranjeeta Popli 
SUBMITTED BY 
Nidhi 
Vaibhav 
Swati Grover 
Shobhika 
Akshay 
Nitin 
 
   
GITARATTAN INTERNATIONAL BUSINESS SCHOOL 
(AffiIiated to GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY) 
ROHINI,NEW DELHI- 110085 
(MBA- 2011-2013)
TABLE OF CONTENTS 
 
 
  Acknowledgement 
2  ertiIicate 
3  Introduction to E-ommerce 
4  History 
5  Types oI E-ommerce 
a  2 
b  2 
c  2 
d  Peer to Peer 
e  -ommerce 
6  Advantages and Disadvantages oI E-ommerce 
7  Introduction to Digital Signature 
8  History oI Digital Signature 
9  urrent state oI use 
 ibliography 
   
ACKNOWLEDGEMENT 
The  satisIaction  and  euphoria  that  accompany  a  successIul  completion  oI  any  task  is  incomplete 
without  mentioning  the  persons  involved  whose  consistent  guidance  and  encouragement  crowned  the 
eIIorts with success. 
 
 We  would  like  to  thank  our  guide  s.  Ranjeeta  Popli  Ior  her  guidance  and  motivation,  which  was 
pivotal in completion oI our report. 
 
Last but not least, we Ieel indebted to all those persons who have provided help directly or indirectly in 
successIul completion oI this study. 
 
 
 
 
 
Date:                                                         
                  Swati Grover 
                                                Nidhi 
                                                Shobhika 
                                                Vaibhav 
                                                Akshay 
                                                Nitin 
 
   
CERTIFICATE 
 
 
 
This  is  to  certify  that  the  project  report  entitled  E-Commerce  and  Digital  Signature 
submitted for the degree of MBA is bonafide work done by Nidhi, Vaibhav Shukla, Akshay 
Chaddha, Nitin, Swati Grover and Shobhika Tyagi. They have worked under my guidance 
and supervision for this project. 
 
I hereby certify her project report and approve it. 
 
 
 
 
 
 
PRO1ECT GUIDE     
  
(Ms. Ranjeeta Popli)       
(Lecturer) 
Gittarattan International Business School   
Introduction to E-Commerce 
 
 
EIectronic  commerce,  commonly  known  as e-commerce,  refers  to  the 
buying  and  selling  of  products or services over  electronic  systems  such  as 
the  nternet  and  other computer  networks.  However,  the  term  may  refer  to 
more than just buying and selling products online. t also includes the entire 
online  process  of  developing,  marketing,  selling,  delivering,  servicing  and 
paying  for  products  and  services.  The  amount  of  trade  conducted 
electronically  has  grown  extraordinarily  with  widespread  nternet  usage. 
The  use  of  commerce  is  conducted  in  this  way,  spurring  and  drawing  on 
innovations  in transfer,  supply, nternet  marketing, online  transaction 
processing, electronic  data  interchange (ED), inventory 
management systems,  and  automated  data  collection  systems.  Modern 
electronic  commerce  typically  uses  the Web  at  least  at  one  point  in  the 
transaction's  life-cycle,  although  it  may  encompass  a  wider  range  of 
technologies such as e-mail, mobile devices and telephones as well. 
A  large  percentage  of  electronic  commerce  is  conducted  entirely  in 
electronic  form  for virtual items  such  as  access  to  premium  content  on  a 
website,  but  mostly  electronic  commerce  involves  the  transportation  of 
physical  items  in  some  way.  Online  retailers  are  sometimes  known  as e-
tailors and  online  retail  is  sometimes  known  as e-taiI.  Almost  all  big 
retailers are now electronically present on the World Wide Web. 
Electronic  commerce  that  takes  place  between  businesses  is  referred  to 
as business-to-business or  B2B.  B2B  can  be  open  to  all  interested 
parties  (e.g. commodity  exchange)  or  limited  to  specific,  pre-qualified 
participants  (private  electronic  market).  Electronic  commerce  that  takes 
place  between  businesses  and  consumers,  on  the  other  hand,  is 
referred to asbusiness-to-consumer or B2C. This is the type of electronic 
commerce  conducted  by  companies  such  as Amazon.com. Online 
shopping is  a  form  of  electronic  commerce  where  the  buyer  is  directly 
online  to  the  seller's  computer  usually  via  the  internet.  There  is  no 
intermediary  service  involved.  The  sale  or  purchase  transaction  is 
completed  electronically  and  interactively  in  real-time  such  as  in 
Amazon.com for new books. However in some cases, an intermediary may 
be  present  in  a  sale  or  purchase  transaction  such  as  the  transactions 
on eBay.com. 
Electronic  commerce  is  generally  considered  to  be  the  sales  aspect  of e-
business. t also consists of the exchange of data to facilitate the financing 
and payment aspects of business transactions. 
 
   
History 
 
EarIy deveIopment 
Originally,  electronic  commerce  was  identified  as  the  facilitation  of 
commercial transactions electronically, using technology such as Electronic 
Data  nterchange  (ED) and Electronic  Funds  Transfer  (EFT).  These  were 
both introduced in the late 1970s, allowing businesses to send commercial 
documents like purchase orders  or invoices  electronically. The growth  and 
acceptance  of  credit  cards,  automated  teller  machines  (ATM)  and 
telephone  banking  in  the  1980s  were  also  forms  of  electronic  commerce. 
Another form of e-commerce  was the  airline reservation system typified by 
Sabre in the USA and Travicom in the UK. 
From  the  1990s  onwards,  electronic  commerce  would  additionally 
include planning systems (ERP), data mining and data warehousing. 
n  1990, Tim  Berners-Lee invented  the Worldwide  Web web  browser and 
transformed  an  academic  telecommunication  network  into  a  worldwide 
everyman  everyday  communication  system  called  internet/www. 
Commercial  enterprise  on  the nternet was  strictly  prohibited  by  NSF  until 
1995.  Although  the  nternet  became  popular  worldwide  around  1994  with 
the  adoption  of Mosaic web  browser,  it  took  about  five  years  to  introduce 
security protocols and DSL allowing continual connection to the nternet. By 
the  end  of  2000,  many  European  and  American  business  companies 
offered  their  services  through  the World  Wide  Web.  Since  then  people 
began  to  associate  a  word  "ecommerce"  with  the  ability  of  purchasing 
various  goods  through  the  nternet  using  secure  protocols  and  electronic 
payment services. 
 
   
Features of E-Commerce 
Ubiquity  -  n  traditional  commerce,  a  marketplace  is  a  physical  place  we 
visit  in  order  to  transact.  For  example,  television  and  radio  are  typically 
directed  to  motivating  the  customer  to  go  someplace  to  make  a  purchase. 
E-commerce  is  ubiquitous,  meaning  that  it  is  available  just  about 
everywhere  at  all  times.  t  liberates  the  market  from  being  restricted  to  a 
physical space and makes it possible to shop from your desktop. The result 
is  called  a  market  space.  From  consumer  point  of  view,  ubiquity  reduces 
transaction costs - the cost of participating in a market. To transact, it is no 
longer necessary that  you spend time  and money traveling to a market. At 
a  broader  level,  the  ubiquity  of  e-commerce  lowers  the  cognitive  energy 
required to complete a task. 
GIobaI  Reach  -  E-commerce  technology  permits  commercial  transactions 
to  cross  cultural  and  national  boundaries  far  more  conveniently  and 
effectively  as  compared  to  traditional  commerce.  As  a  result,  the  potential 
market  size  for  e-commerce  merchants  is  roughly  equal  to  the  size  of 
world's online population. 
UniversaI  Standards  -  One  strikingly  unusual  feature  of  e-commerce 
technologies  is  that  the  technical  standards  of  the  nternet  and  therefore 
the technical standards for conducting e-commerce are universal standards 
i.e. they are shared by all the nations around the world. 
Interactivity  -  Unlike  any  of  the  commercial  technologies  of  the  twentieth 
century,  with  the  possible  exception  of  the  telephone,  e-commerce 
technologies  are  interactive,  meaning  they  allow  for  two-way 
communication between merchants and consumer. 
Information  Density  and  Richness  -  The  nternet  vastly  increase 
information  density.  t  is  the  total  amount  and  quality  of  information 
available  to  all  market  participants,  consumers  and  merchants.  E-
commerce  technologies  reduce  information  collection,  storage, 
communication and processing costs. At the same time, these technologies 
increase  greatly  the  accuracy  and  timeliness  of  information,  making 
information  more  useful  and  important  than  ever.  As  a  result,  information 
becomes  plentiful,  cheaper  and  of  higher  quality.  nformation  richness 
refers to the complexity and content of a message. 
PersonaIization  -  E-commerce  technologies  permit  personalization. 
Merchants  can  target  their  marketing  messages  to  specific  individuals  by 
adjusting  the  message  to  a  person's  name,  interests  and  past  purchases. 
The  technology  also  permits  customization.  Merchants  can  change  the 
product or service based on user's preferences or prior behavior. 
E-commerce  technologies  make  it  possible  for  merchants  to  know  much 
more about consumers and use this information more effectively than ever 
before.  Online  merchants  can  use  this  information  to  develop  new 
information  asymmetries,  enhance  their  ability  to  brand  products,  charge 
premium  prices  for  high  quality  service  and  segment  the  market  into  an 
endless number of subgroups, each receiving a different price. 
 
 
   
Types of E-Commerce 
Business to Consumer  
 
B2C  stands  for  Business  to  Consumer  as  the  name  suggests,  it  is  the 
model  taking  businesses  and  consumers  interaction.Online  business  sells 
to  individualsThe  basic  concept  of  this  model  is  to  sell  the  product  online 
to the consumers. 
B2c is the indirect trade between the company and consumers.  t provides 
direct  selling  through  online.  For  example:  if  you  want  to  sell  goods  and 
services  to  customer  so  that  anybody  can  purchase  any  products  directly 
from supplier's website. 
Directly  interact  with  the  customers  is  the  main  difference  with  other 
business  model.  AsB2B  it  manages  directly  relationship  with  consumers, 
B2C  supply  chains  normally  dealwith  business  that  are  related  to  the 
customer
 
 
 
 
 
Business to Business
 
 
 
B2B  stands  for  Business  to  Business.  t  consists  of  largest  form  of 
Ecommerce.  This  model  defines  that  Buyer  and  seller  are  two  different 
entities.  t  is  similar  to  manufacturer  issuing  goods  to  the  retailer  or 
wholesaler.  Dell deals computers and other associated accessories online 
but  it  is  does  not  make  up  all  those  products.  So,  in  govern  to  deal  those 
products,  first  step  is  to  purchases  them  from  unlike  businesses  i.e.  the 
producers of those products 
 
"t is one of the cost effective way to sell out product throughout the world 
 
 
Consumer to Consumer 
 
 
 
 
 
C2C  stands  for  Consumer  to  Consumer.  t  helps  the  online  dealing  of 
goods or services among people. Though there is no major parties needed 
but  the  parties  will  not  fulfill  the  transactions  without  the  program  which  is 
supplied by the online market dealer such as eBay. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Peer to Peer 
 
 
 
 
 
t  is  a  discipline  that  deal  itself  which  assists  people  to  instantly  shares 
related computer files and computer sources without having to interact with 
central  web  server.f  you  are  going  to  implement  this  model,  both  sides 
demand  to  install  the  expected  software  so  that  they  could  able  to  convey 
on  the  mutual  platform.  This  kind  of  e-commerce  has  very  low  revenue 
propagation  as  from  the  starting  it  has  been  tended  to  the  release  of  use 
due to which it sometimes caught involved in cyber laws. 
 
 
 
 
 
M-Commerce 
 
 
 
t  deals  with  conducting  the  transactions  with  the  help  of  mobile.  The 
mobile  device  consumers  can  interact  each  other  and  can  lead  the 
business.  Mobile  Commerce  involves  the  change  of  ownership  or  rights  to 
utilize goods and related services. 
   
Advantages and Disadvantages of E-Commerce 
The  invention  of  faster  internet  connectivity  and  powerful  online  tools  has 
resulted  in  a  new  commerce  arena    Ecommerce.  Ecommerce  offered 
many  advantages  to  companies  and  customers  but  it  also  caused  many 
problems. 
 
 
 
 
Advantages of E-Commerce 
 
O  Faster buying/selling procedure, as well as easy to find products. 
O  Buying/selling 24/7. 
O  More  reach  to  customers,  there  is  no  theoretical  geographic 
limitations. 
O  Low operational costs and better quality of services. 
O  No need of physical company set-ups. 
O  Easy to start and manage a business. 
O  Customers can easily select products from different providers without 
moving around physically. 
 
Disadvantages of E-Commerce 
 
O  Any  one,  good  or  bad,  can  easily  start  a  business.  And  there  are 
many bad sites which eat up customers' money. 
O  There is no guarantee of product quality. 
O  Mechanical  failures  can  cause  unpredictable  effects  on  the  total 
processes. 
O  As  there  is  minimum  chance  of  direct  customer  to  company 
interactions, customer loyalty is always on a check. 
O  There  are  many  hackers  who  look  for  opportunities,  and  thus  an 
ecommerce site, service, payment gateways; all are always prone to 
attack. 
   
 
DigitaI Signature 
 
 
A digital  signature or digital  signature  scheme is  a  mathematical  scheme 
for demonstrating the authenticity of a digital message or document. A valid 
digital  signature  gives  a  recipient  reason  to  believe  that  the  message  was 
created  by  a  known  sender,  and  that  it  was  not  altered  in  transit.  Digital 
signatures  are  commonly  used  for  software  distribution,  financial 
transactions,  and  in  other  cases  where  it  is  important  to  detect  forgery  or 
tampering. 
 
ExpIanation 
Digital  signatures  are  often  used  to  implement electronic  signatures,  a 
broader  term  that  refers  to  any  electronic  data  that  carries  the  intent  of  a 
signature, but  not  all  electronic  signatures  use  digital  signatures n  some 
countries,  including  the  United  States,  ndia,  and  members  of  the 
European,  electronic  signatures  have  legal  significance.  However,  laws 
concerning  electronic  signatures  do  not  always  make  clear  whether  they 
are  digital  cryptographic  signatures  in  the  sense  used  here,  leaving  the 
legal definition, and so their importance, somewhat confused. 
Digital  signatures  employ  a  type  of asymmetric  cryptography.  For 
messages  sent  through  a  non  secure  channel,  a  properly  implemented 
digital signature gives the receiver reason to believe the message was sent 
by  the  claimed  sender.  Digital  signatures  are  equivalent  to  traditional 
handwritten  signatures  in  many  respects;  properly  implemented  digital 
signatures  are  more  difficult  to  forge  than  the  handwritten  type.  Digital 
signature  schemes  in  the  sense  used  here  are  cryptographically  based, 
and  must  be  implemented  properly  to  be  effective.  Digital  signatures  can 
also  provide non-repudiation,  meaning  that  the  signer  cannot  successfully 
claim  they  did  not  sign  a  message,  while  also  claiming  their  private  key 
remains secret; further, some  non-repudiation schemes  offer  a time stamp 
for  the  digital  signature,  so  that  even  if  the  private  key  is  exposed,  the 
signature is valid nonetheless. Digitally signed messages may be anything 
representable  as  a bit  string:  examples  include mail,  contracts,  or  a 
message sent via some other cryptographic protocol. 
 
Definition 
A digital signature scheme typically consists of three algorithms: 
  A key generation algorithm that selects a private key uniformly at random from a set 
of  possible  private  keys.  The  algorithm  outputs  the  private  key  and  a 
corresponding public key. 
  A signing algorithm that, given a message and a private key, produces a signature. 
  A signature  verifying algorithm  that,  given  a  message,  public  key  and  a  signature, 
either accepts or rejects the message's claim to authenticity. 
Two  main  properties  are  required.  First,  a  signature  generated  from  a  fixed  message 
and  fixed  private  key  should  verify  the  authenticity  of  that  message  by  using  the 
corresponding  public  key.  Secondly,  it  should  be  computationally  infeasible  to 
generate a valid signature for a party who does not possess the private key. 
History 
 
n  1976, Whitfield  Diffie and Martin  Hellman first  described  the  notion  of  a 
digital  signature  scheme,  although  they  only  conjectured  that  such 
schemes  existed. Soon  afterwards, Ronald  Rivest, Adi  Shamir,  and Len 
Adleman invented  the RSA algorithm,  which  could  be  used  to  produce 
primitive  digital  signatures (although  only  as  a  proof-of-concept"plain" 
RSA  signatures  are  not  secure).  The  first  widely  marketed  software 
package  to  offer  digital  signature  was Lotus  Notes 1.0,  released  in  1989, 
which used the RSA algorithm.  
To  create  RSA  signature  keys,  generate  an  RSA  key  pair  containing  a 
modulus N that  is  the  product  of  two  large  primes,  along  with 
integers e and d such  that e  d =  1  (mod  (N)),  where    is  the Euler  phi-
function.  The  signer's  public  key  consists  of N and e,  and  the  signer's 
secret key contains d. 
To  sign  a  message m,  the  signer  computes  o  = m
d
 (mod N).  To  verify,  the 
receiver checks that o
e
 =m (mod N). 
As noted earlier, this basic scheme is not very secure. To prevent  attacks, 
one  can  first  apply  acryptographic  hash  function to  the  message m and 
then apply the RSA algorithm described above to the result. This approach 
can be proven secure in the so-called random oracle model
.
 
Other  digital  signature  schemes  were  soon  developed  after  RSA,  the 
earliest  being Lamport  signatures, Merkle  signatures (also  known  as 
"Merkle trees" or simply "Hash trees"),and Rabin signatures.  
n  1988, Shafi  Goldwasser, Silvio    Micali,  and  Ronald  Rivest  became  the 
first  to  rigorously  define  the  security  requirements  of  digital  signature 
schemes They  described  a  hierarchy  of  attack  models  for  signature 
schemes,  and  also  present  the GMR  signature  scheme,  the  first  that  can 
be proven to prevent even an existential forgery against a chosen message 
attack.  
Most  early  signature  schemes  were  of  a  similar  type:  they  involve  the  use 
of  a trapdoor  permutation,  such  as  the  RSA  function,  or  in  the  case  of  the 
Rabin  signature  scheme,  computing  square  modulo  composite n. A 
trapdoor  permutation  family  is  a  family  of permutations,  specified  by  a 
parameter that is easy to compute in the forward direction, but is difficult to 
compute  in  the  reverse  direction  without  already  knowing  the  private  key. 
However,  for  every  parameter  there  is  a  "trapdoor"  (private  key)  which 
when  known,  easily  decrypts  the  message.  Trapdoor  permutations  can  be 
viewed as public-key encryption systems, where the parameter is the public 
key  and  the  trapdoor  is  the  secret  key,  and  where  encrypting  corresponds 
to  computing  the  forward  direction  of  the  permutation,  while  decrypting 
corresponds  to  the  reverse  direction.  Trapdoor  permutations  can  also  be 
viewed  as  digital  signature  schemes,  where  computing  the  reverse 
direction  with  the  secret  key  is  thought  of  as  signing,  and  computing  the 
forward  direction  is  done  to  verify  signatures.  Because  of  this 
correspondence, digital signatures are often described as based on public-
key  cryptosystems,  where  signing  is  equivalent  to  decryption  and 
verification  is  equivalent  to  encryption,  but  this  is  not  the  only  way  digital 
signatures are computed. 
Used  directly,  this  type  of  signature  scheme  is  vulnerable  to  a  key-only 
existential forgery  attack. To create  a forgery, the attacker  picks a random 
signature  o  and  uses  the  verification  procedure  to  determine  the 
message m corresponding to that signature. n practice, however, this type 
of  signature  is  not  used  directly,  but  rather,  the  message  to  be  signed  is 
first hashed to  produce  a  short  digest  that  is  then  signed.  This  forgery 
attack, then, only produces the hash function output that corresponds to o, 
but  not  a  message  that  leads  to  that  value,  which  does  not  lead  to  an 
attack. n the random oracle model, this hash-and-decrypt form of signature 
is existentially enforceable, even against a chosen-message attack.  
There are several reasons to sign such a hash (or message digest) instead 
of the whole document. 
  For  efficiency: The  signature  will  be  much  shorter  and  thus  save  time 
since hashing is generally much faster than signing in practice. 
  For  compatibiIity: Messages  are  typically  bit  strings,  but  some 
signature  schemes  operate  on  other  domains  (such  as,  in  the  case  of 
RSA, numbers modulo a composite number N). A  hash function can  be 
used to convert an arbitrary input into the proper format. 
  For  integrity: Without  the  hash  function,  the  text  "to  be  signed"  may 
have  to  be  split  (separated)  in  blocks  small  enough  for  the  signature 
scheme  to  act  on  them  directly.  However,  the  receiver  of  the  signed 
blocks  is  not  able  to  recognize  if  all  the  blocks  are  present  and  in  the 
appropriate order. 
 
   
How DigitaI Signatures works:  
 
Assume  you  were  going  to  send  the  draft  of  a  certain  contract  to  your 
lawyer in another town. You  want to give  your lawyer the assurance that it 
was  unchanged  from  what  you  sent  and  that  it  is  really  from  you. 
Here then would be the process: 
 
1.  You  copy-and-paste  the  contract  (it's  a  short  one!)  into  an  e-mail  note. 
2.  Using  special  software,  you  obtain  a  message  hash  (mathematical 
summary) of the contract. 
3.  You  then  use  a  private  key  that  you  have  previously  obtained  from  a 
public-private key authority to encrypt the hash. 
4.  The  encrypted  hash  becomes  your  digital  signature  of  the  message. 
(Note that it will be different each time you send a message.) 
 
Diagram  showing  how  a  simple  digital  signature  is  applied  and  then 
verified. 
   
 
Advantages and Disadvantages of E-Signature: 
 
 Just  as  with  any  technology,  there  will  be  plus  and  minuses.  This  is  the 
way  it  is  with  anything,  whether  it  is  technology  related  or  not.  The 
advantages of using digital signatures include: 
  Imposter  prevention: By  using  digital  signatures  you  are  actually 
eliminating the possibility of committing fraud by an imposter signing the 
document.  Since  the  digital  signature  cannot  be  altered,  this  makes 
forging the signature impossible. 
  Message integrity: By having a digital signature you are in fact showing 
and  simply  proving  the  document  to  be  valid.  You  are  assuring  the 
recipient that the document is free from forgery or false information. 
  LegaI  requirements: Using  a  digital  signature  satisfies  some  type  of 
legal requirement for the document in question. A digital signature takes 
care of any formal legal aspect of executing the document. 
 
The Disadvantages of  using  digital  signatures  involve  the  primary  avenue 
for any business: money. This is because the business may have to spend 
more  money  than  usual  to  work  with  digital  signatures  including  buying 
certificates  from  certification  authorities  and  getting  the  verification 
software. 
   
 
 
Uses of DigitaI Signature 
As  organizations  move  away  from  paper  documents  with  ink  signatures 
or  authenticity stamps, digital signatures can provide  added  assurances 
of  the  evidence  to  provenance,  identity,  and  status  of  an  electronic 
document as well as acknowledging informed consent and approval by a 
signatory.  The  United  States  Government  Printing  Office  (GPO) 
publishes electronic versions of the budget, public and private laws, and 
congressional  bills  with  digital  signatures.  Universities  including  Penn 
State,  University,  and  Stanford  are  publishing  electronic  student 
transcripts with digital signatures. 
Below  are  some  common  reasons  for  applying  a  digital  signature  to 
communications: 
 
Authentication 
Although  messages  may  often  include  information  about  the  entity 
sending  a  message,  that  information  may  not  be  accurate.  Digital 
signatures  can  be  used  to  authenticate  the  source  of  messages.  When 
ownership of a digital signature secret key is bound to a specific user, a 
valid  signature  shows  that  the  message  was  sent  by  that  user.  The 
importance  of  high  confidence  in  sender  authenticity  is  especially 
obvious  in  a  financial  context.  For  example,  suppose  a  bank's  branch 
office sends instructions to the central office requesting a  change in the 
balance  of  an  account.  f  the  central  office  is  not  convinced  that  such  a 
message  is  truly  sent  from  an  authorized  source,  acting  on  such  a 
request could be a grave mistake. 
 
Integrity 
n  many  scenarios,  the  sender  and  receiver  of  a  message  may  have  a 
need  for  confidence  that  the  message  has  not  been  altered  during 
transmission.  Although  encryption  hides  the  contents  of  a  message,  it 
may  be  possible  to change an  encrypted  message  without 
understanding  it.  (Some  encryption  algorithms,  known 
as nonmalleable ones,  prevent  this,  but  others  do  not.)  However,  if  a 
message  is  digitally  signed,  any  change  in  the  message  after  signature 
will invalidate the signature.  
Furthermore,  there  is  no  efficient  way  to  modify  a  message  and  its 
signature to produce a new message with a valid signature, because this 
is still considered to be computationally infeasible by most cryptographic 
hash functions. 
 
Non-repudiation 
Non-repudiation,  or  more  specifically non-repudiation  of  origin,  is  an 
important aspect of digital signatures. By this property an entity that has 
signed  some  information  cannot  at  a  later  time  deny  having  signed  it. 
Similarly,  access  to  the  public  key  only  does  not  enable  a  fraudulent 
party to fake a valid signature. 
 
Current State of Use- LegaI and PracticaI 
Digital  signature  schemes  share  basic  prerequisites  that  regardless  of 
cryptographic theory or legal provision they need to have meaning: 
1. QuaIity aIgorithms  
Some  public-key  algorithms  are  known  to  be  insecure,  practicable 
attacks against them having been discovered. 
 
2. QuaIity impIementations  
An  implementation  of  a  good  algorithm  (or protocol)  with  mistake(s) 
will not work. 
 
3. The private key must remain private  
if  it  becomes  known  to  any  other  party,  that  party  can 
produce perfect digital signatures of anything whatsoever. 
 
4. The pubIic key owner must be verifiabIe  
A  public  key  associated  with  Bob  actually  came  from  Bob.  This  is 
commonly  done  using  a  public and  the  public  key   user  association 
is  attested  by  the  operator  of  the  PK  (called  a certificate  authority). 
For  'open'  PKs  in  which  anyone  can  request  such  an  attestation 
(universally  embodied  in  a  cryptographically  protected identity 
certificate), the possibility of mistaken attestation is not trivial.  
Commercial  PK  operators  have  suffered  several  publicly  known 
problems.  Such  mistakes  could  lead  to  falsely  signed,  and  thus 
wrongly  attributed,  documents.  'Closed'  PK  systems  are  more 
expensive, but less easily subverted in this way. 
 
 
5. Users (and their software) must carry out the signature protocoI 
properIy. 
 
Only  if  all  of  these  conditions  are  met  will  a  digital  signature  actually 
be  any  evidence  of  who  sent  the  message,  and  therefore  of  their 
assent  to  its  contents.  Legal  enactment  cannot  change  this  reality  of 
the  existing  engineering  possibilities,  though  some  such  have  not 
reflected this actuality. 
Legislatures, being importuned by businesses expecting to profit from 
operating a PK, or by  the technological avant-garde  advocating  new 
solutions to old problems, have enacted statutes and/or regulations in 
many  jurisdictions  authorizing,  endorsing,  encouraging,  or  permitting 
digital  signatures  and  providing  for  (or  limiting)  their  legal  effect.  The 
first  appears  to  have  been  in Utah in  the  United  States,  followed 
closely  by  the  states Massachusetts and California.  Other  countries 
have  also  passed  statutes  or  issued  regulations  in  this  area  as  well 
and  the  UN  has  had  an  active  model  law  project  for  some  time. 
These  enactments  (or  proposed  enactments)  vary  from  place  to 
place,  have  typically  embodied  expectations  at  variance 
(optimistically  or  pessimistically)  with  the  state  of  the 
underlying cryptographic  engineering,  and  have  had  the  net  effect  of 
confusing  potential  users  and  specifies,  nearly  all  of  whom  are  not 
cryptographically  knowledgeable.  Adoption  of  technical  standards  for 
digital  signatures  have  lagged  behind  much  of  the  legislation, 
delaying  a  more  or  less  unified  engineering  position 
on interoperability, algorithm choice, key  lengths,  and  so  on  what  the 
engineering is attempting to provide. 
 
   
 
8|b||ography 
WebslLe 
wwwgooglecom 
O  en.wikipedia.org/wiki/Electronic_commerce 
O  www.wikinvest.com/concept/E-Commerce 
O  en.wikipedia.org/wiki/Digital_signature 
O  www.youdzone.com/signature.html 
 
8eference 8ooks 
ommerce kk 8a[a[ 
ommerce Iundamenta| and App||cat|ons Penry Chan and 8aymond Lee 
D|g|ta| S|gnature Network Secur|ty ract|ces kallash n Agarwala raLeek Amar 
Agarwala