• Like
Digital Signature
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Digital Signature

  • 12,008 views
Published

safest way to transact online

safest way to transact online

Published in Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • nice buddy
    Are you sure you want to
    Your message goes here
  • its very nice...thanks
    Are you sure you want to
    Your message goes here
  • thanx for the assistance
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
12,008
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
969
Comments
3
Likes
7

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BY: SUMAN SAURAV
  • 2.  
  • 3. ENCRYPT ( LOCK ) Message Ciphertext “ Secret” Key DECRYPT ( UNLOCK ) Ciphertext Message (Sender) (Receiver)
  • 4. ENCRYPT (LOCK) Cleartext Ciphertext Public Key DECRYPT (UNLOCK) Ciphertext Private Key Cleartext (Sender) (Receiver)
  • 5.  
  • 6.
    • Digital Identity that establishes your credentials when doing business or other transactions on the Web
    • Issued by a Certifying Authority (CA)
    • Contains your name, serial number, expiration dates, public key, signature of CA
  • 7.
    • Trusted Third Party
    • An organization which issues public key certificates
    • Assures the identity of the parties to whom it issues certificates
    • Maintains online access to the public key certificates issued
  • 8. Signed by using CA’s private key User Name & other credentials User’s Public key User Certificate Certificate Database Publish Certificate Request Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No.
  • 9.
    • Uses secure hash algorithm
    • Condenses message to 160 bit
    • Key size 512-1024 bits
    • Proposed by NIST in 1991
    • Adopted
  • 10. Soft Token Hardware tokens Smart card
  • 11.  
  • 12. Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation
    • Handwriting expert needed
    • Error prone
    • Any computer user
    • Error free
  • 13.