EAudit tool - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

EAudit tool

Description:

... be verified that Mr X stands in agreement to abide by what is contained in the document. ... Verifying documents that does not match in a folder using Hash ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 26
Provided by: Bil55
Category:
Tags: din | does | eaudit | for | stand | tool | what

less

Transcript and Presenter's Notes

Title: EAudit tool


1
E-Audit tool
Hash / Digital Signature based
Sign and Verify files in a folder From Bellur
Infortech(P)Ltd. 32/38/1, 22nd main,
Padmanabhanagar, Bangalore -560 070, Phone
No91-80-26390340 www.binfortech.com
2
Electronic-Audit tool presentation
  • Signature is a symbol of a person affixed on a
    document for the purpose of agreeing with the
    contents there in.
  • Hashing is a technology to check data integrity
    of documents and one of the two elements of
    digital signature.
  • The purpose of Authentication of an electronic
    document is two fold.
  • The first objective of authentication is to link
    a person as signatory to an electronic document.
  • The second objective of authentication is to
    confirm that the signatory is giving his
    confirmation of some data which is present in the
    electronic document.
  • We say that an electronic document is
    Authenticated or Signed by Mr X when it can
    be verified that Mr X stands in agreement to
    abide by what is contained in the document.

3
  • In the electronic world we need the Signature
    to perform the twin objectives of authentication
    namely identification of the person
    authenticating and confirming that no change has
    been made to the document after it was signed.
    To achieve these objectives the two technologies
    namely the Asymmetric Crypto System and Hash
    Function are identified.
  • Hash and Asymmetric Crypto system are both based
    on mathematical operations that can be performed
    on a numerical value.
  • An E-auditing tool has been developed by Bellur
    Infortech (P) Ltd. in collaboration with Naavi
    (Ujvala Consultants Pvt Ltd.) which enables use
    of Hash / Digital Signatures for auditing of
    electronic documents.

4
  • When an electronic document is passed through the
    hash algorithm, it produces a result which is
    called Hash Code or Message Digest or Hash
    Value.
  • A Hash Value of a stream of data which we
    normally read in the computer as Digital
    Signature Document using MD5 algorithm looks
    like the following.
  • f70ef4584bb4d1f0a4392561264628bf
  • If the above sentence is modified as Digital
    Signature document,
  • then the hash value would be
  • b1fc5907fa4ced2c089de48e653e82ae
  • Note that when the capital D in Document is
    changed to d, the hash code shows a significant
    change.
  • This is the unique character of the hash
    algorithm that it produces a unique hash value
    for a document and any minor change would show up
    as a change in the value. No two documents can
    produce the same hash value unless they are
    absolutely identical bit by bit. This property is
    used in digital signatures to check the Data
    Integrity of a document between the time the
    document is signed and the time the signature is
    verified.

5
  • Asymmetric Cryptosystem is the technical tool to
    identify the digital signatory
  • Digital Signature is not only a Digital contract
    enabling tool but also an Information Security
    Tool to secure Information in Transit

Hash Value
Document
Encrypted hash value
Digital Signature
  • How to use our E-Audit tool follows.

6
Screen Shots
  • Signing documents in a folder using Hash
    Algorithm

7
Select the hash type to create hash value
Select The Folder
1
Generate hash values of the files
2
5
4
3
Print the hash value
Select the file to view
8
Customizable for specific customers
Folder path
1
Type of hash algorithm
2
9
Screen Shots
  • Signing documents in a folder using Digital
    Signature

10
Select The Folder
1
Select hash type
2
4
5
Generate Digital Signature
Print the hash value
3
Select your Digital Certificate
11

12
Email id from Digital Certificate
Customizable for specific customers
1
13
Screen Shots
  • Verifying documents that match in a folder using
    Hash Algorithm.

14
Select the correct folder to verify hash
Select the hash type to create hash value
1
Verify hash values of files
2
3
5
4
6
Select the file to view
Hash code values match
Print the hash value
15
Folder path
Customizable for specific customers
1
Type of hash algorithm
2
3
Document Hash code values match
16
Screen Shots
  • Verifying documents that does not match in a
    folder using Hash Algorithm.

17
Document modified after Sign
1
2
Document hash values does not match
18
Document modified after Sign
1
2
Document hash values does not match.
19
Screen Shots
  • Verifying documents in a folder that match using
    Digital Signature.

20
Select correct folder to verify documents
Verify documents using Digital Signature
1
2
Select hash type
4
3
Select Digital Certificate
21
Documents match with Digital Certificate
1
22
Folder path
1
2
3
Email-id from Digital Certificate
Documents match with Digital Certificate
23
Screen Shots
  • Verifying documents in a folder that does not
    match using Digital Signature.

24
Document modified after Sign
1
2
Document does not match with Digital Certificate
25
Document modified after Sign
1
2
Document does not match with Digital Certificate
Write a Comment
User Comments (0)
About PowerShow.com