SlideShare a Scribd company logo
1 of 18
Message Digest &
Digital Signature.
Presented By
 Lamack Jose (Roll No 16)
 Dinesh Kodam (Roll No 34)
 Manoj Patil (Roll No 36)
Concept of Hash (Message
Digest)

2
Concept of Hash (Message
Digest)

3
Idea of a Message Digest

4
Idea of a Message Digest

5
Requirement of a Message
Digest

6
Message Digest

7
Digital Signatures

farhan.mohd@yahoo.co.in

8
Digital Signatures

9
Digital Signatures

10
Steps for the process

11
Digital Signatures

12
The Sender’s Side

13
The Receiver’s Side

14
Properties of Digital Signatures
•

Digital signature does not provide
privacy. If there is a need for
privacy, another layer of
encryption/decryption must be
applied.

•
1.
2.
3.

Digital signatures can provide
Integrity,
Authentication, and
Nonrepudiation.

15
Properties of Digital Signatures

16
Properties of Digital Signatures
1.

2.

Integrity The integrity of a message is
preserved because if Eve intercepted the
message and partially or totally changed it,
the decrypted message would be
unreadable.
Authentication We can use the following
reasoning to show how a message can be
authenticated. If Eve sends a message while
pretending that it is coming from Alice, she
must use her own private key for encryption.
The message is then decrypted with the
public key of Alice and will therefore be
nonreadable. Encryption with Eve's private
key and decryption with Alice's public key
result in garbage.

17
Properties of Digital Signatures
3.

Nonrepudiation Digital signature also provides for
nonrepudiation. Bob saves the message received
from Alice. If Alice later denies sending the
message, Bob can show that encrypting and
decrypting the saved message with Alice's private
and public key can create a duplicate of the
saved message. Since only Alice knows her
private key, she cannot deny sending the
message.

18

More Related Content

What's hot

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithmRuchi Maurya
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Encapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityEncapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityKoushil Mankali
 

What's hot (20)

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Ipsec
IpsecIpsec
Ipsec
 
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block CiphersCNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Ch13
Ch13Ch13
Ch13
 
MD5
MD5MD5
MD5
 
Encapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityEncapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network Security
 

Viewers also liked

Viewers also liked (20)

Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
 
Cryptography
Cryptography Cryptography
Cryptography
 
Hash function
Hash function Hash function
Hash function
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 
Network security
Network securityNetwork security
Network security
 
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
 
Linux booting process
Linux booting processLinux booting process
Linux booting process
 
Disk
DiskDisk
Disk
 
Md5
Md5Md5
Md5
 
Ch31
Ch31Ch31
Ch31
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Byte Rotation Algorithm
Byte Rotation AlgorithmByte Rotation Algorithm
Byte Rotation Algorithm
 
Raid_intro.ppt
Raid_intro.pptRaid_intro.ppt
Raid_intro.ppt
 

Message digest & digital signature

  • 1. Message Digest & Digital Signature. Presented By  Lamack Jose (Roll No 16)  Dinesh Kodam (Roll No 34)  Manoj Patil (Roll No 36)
  • 2. Concept of Hash (Message Digest) 2
  • 3. Concept of Hash (Message Digest) 3
  • 4. Idea of a Message Digest 4
  • 5. Idea of a Message Digest 5
  • 6. Requirement of a Message Digest 6
  • 11. Steps for the process 11
  • 15. Properties of Digital Signatures • Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. • 1. 2. 3. Digital signatures can provide Integrity, Authentication, and Nonrepudiation. 15
  • 16. Properties of Digital Signatures 16
  • 17. Properties of Digital Signatures 1. 2. Integrity The integrity of a message is preserved because if Eve intercepted the message and partially or totally changed it, the decrypted message would be unreadable. Authentication We can use the following reasoning to show how a message can be authenticated. If Eve sends a message while pretending that it is coming from Alice, she must use her own private key for encryption. The message is then decrypted with the public key of Alice and will therefore be nonreadable. Encryption with Eve's private key and decryption with Alice's public key result in garbage. 17
  • 18. Properties of Digital Signatures 3. Nonrepudiation Digital signature also provides for nonrepudiation. Bob saves the message received from Alice. If Alice later denies sending the message, Bob can show that encrypting and decrypting the saved message with Alice's private and public key can create a duplicate of the saved message. Since only Alice knows her private key, she cannot deny sending the message. 18