Controller of Certifying Authorities and Security Sockets layer:

About Controller of Certifying Authorities (CCA):

    • It is an organization that manages and keeps an eye on the operations of Certification Authorities that provide digital certificates that are encrypted (a secure communication method). 
    • With the help of this kind of encryption, relying parties can transfer data securely and authentically, and the Authority has established procedures for confirming the legitimacy of the parties it issues certificates to. 
    • Through the use of a public key certificate, it additionally validates the attribution of a public key to a specific physical individual.
    • Digital signatures based on asymmetric cryptosystems are granted the necessary legal sanctity under Section 18 of The Information Technology Act, 2000. 
    • Electronic documents that have been digitally signed are treated the same as paper documents, and digital signatures are now recognized on par with handwritten signatures. 
    • The Controller of Certifying Authorities (CCA) is empowered by the IT Act to grant licenses and oversee the operations of Certifying Authorities.
    • For the purposes of the IT Act, the Central Government has appointed the Controller of Certifying Authorities in accordance with section 17 of the Act. 
    • It seeks to encourage the widespread use of digital signatures in order to advance the development of e-commerce and e-government. 
    • In order to digitally sign the public keys of Certifying Authorities (CA) across the nation, it established the Root Certifying Authority (RCAI) of India pursuant to section 18(b) of the IT Act. 
    • The Act’s established standards are followed in the operation of the RCAI.
    • It uses its own private key to certify the public keys of CAs, allowing users to confirm online that a particular certificate was issued by a licensed CA. 
    • It functions in this capacity through the Root Certifying Authority of India (RCAI). 
    • All of the certificates granted to the CAs across the nation are housed in the Repository of Digital Certificates, which is managed by the CCA as well.

About Security Sockets Layer (SSL): 

    • It is an Internet security protocol that uses encryption. 
    • Netscape initially created it in 1995 with the intention of guaranteeing data integrity, privacy, and authentication in Internet communications.
    • This encryption is the forerunner of the current Transport Layer Security (TLS) protocol. 
    • The URL of a website that uses SSL/TLS begins with “HTTPS” rather than “HTTP.”
      SSL encrypts data being transmitted over the internet to offer a high level of privacy. As a result, anyone attempting to intercept this data will only be able to see a jumbled, nearly unintelligible character mix. 
    • It starts a handshake, an authentication procedure, between two communicating devices to make sure both are who they say they are. 
    • In order to ensure data integrity and ensure that the data is not altered before it reaches its intended recipient, it also digitally signs data.
    • In order to realize the goal of Universal Health Coverage (UHC), the Government of India launched Ayushman Bharat, a flagship program, as advised by the National Health Policy 2017. 
    • Health and Wellness Centers (HWCs) and the Pradhan Mantri Jan Arogya Yojana (PM-JAY) are its two interconnected components.

Leave a Reply

Your email address will not be published. Required fields are marked *