Your SlideShare is downloading. ×
Podpis elektroniczny i jego zastosowanie w biznesie
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Podpis elektroniczny i jego zastosowanie w biznesie

2,574

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,574
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Digital signature and its use in business PODPISANI.PL
  • 2. Agenda • Application of digital signature • Some primary theory • Polish digital signature act • Digital signature in business
  • 3. Application Źródło: Unizeto Technologies S.A.
  • 4. Theory • Confidentiality – data security against unauthorized access • Integrity – data security against changes • Authenticity – proof of the origin
  • 5. Digital signature Digital signature = • Keys • Public • Private • Certificate
  • 6. Digital signature –keys • Private key = 1276419276529216412731064912412784162 45120341y6298341602452893461093712423 5416543128548320573404712835610823059 8394612563489673931269482365026432187 9542386412892351925423056342096123851 3287412874532985634056340956238541287 4192452305673409641283521874314523056 1280371209387102937102937126412531892 6412564198634129541293198215735128321
  • 7. Private key = public key-1?
  • 8. Operation with keys
  • 9. Private key belongs to me. It’s mine! My precious! Public key belongs to me, but everyone has access to it
  • 10. Questions?
  • 11. Something about… confidentiality Give me your bank account number and I will send you 100 000$
  • 12. Something about… Authenticity Ola has a cat WTF?!
  • 13. Trusted Third Party TTP
  • 14. Trusted Third Party – getting keys Registration certification center place TTP Document transfer Proposal, Repository agreement Źródło:
  • 15. Why trust? ?
  • 16. Certificate You can use it to: •Sign your e-mail •Computer access •Secure your software •Make proof of your identity
  • 17. What the signature are?
  • 18. We sign a message? No. We sign a hash. Calculation of a sign from a very large message is time-consuming. So…
  • 19. Summary Źródło: wikipedia.org

×