Jdbc 7
Upcoming SlideShare
Loading in...5
×
 

Jdbc 7

on

  • 796 views

 

Statistics

Views

Total Views
796
Views on SlideShare
796
Embed Views
0

Actions

Likes
0
Downloads
37
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Jdbc 7 Jdbc 7 Presentation Transcript

  • Digital Signatures tnngo2@gmail.com
  • Need for digital signatures are used to digitally sign messages or objects. Ensuring message content integrity The signature is appended at the end of message before transmission. If an encrypted message is tampered with, the digital signature becomes invalid. Verifying the authenticity of the message sender A digital signature ensures that an encrypted message cannot be deciphered by unintended recipients
  • What is a Digital Signature made up of? are generated by Public Key Cryptography using public and private keys to encrypt and decrypt messages. Public key Private key
  • Comparing Digital signatures with message digest? A message digest is a fixed-length result of converting the contents of a message into a hash-like a cyclic redundancy check. A message digest is appended at the end of a message and transmitted to validate the contents of the original message. A digital signature differs from a simple message digest in: A message digest alters the content of a message into a fixed length result. The original message content cannot be recovered from digest. A message digest does not provide secrecy but a digital signature is encrypted.
  • Working of Digital Signatures Encryption: Decryption:
  • Validating data integrity No difference between data that is sent and received.
  • Drawbacks of digital signatures Non-Repudiation If sender lost its private key, the authenticity of all messages having digital signatures using that key would have been compromised. Time Stamping do not contain any record of the date and time when a particular document was signed.
  • Standards and Features of Digital Certificates A Digital Certificate is a data structure with a digital signature. The data structure also contains information like the public key,identity of the key owner and name of certification authority who guaranteesthe authenticity of the key owner. A signature is viewed as trusted when it is generated by aCertification Authority (CA) since digitally signed data cannot be alteredwithout detection. Two types of certification standards: X.509 PGP (Pretty Good Privacy)
  • Verifying the authenticity of the sender
  • Verifying the authenticity of the sender
  • Verifying the authenticity of the sender
  • Verifying the authenticity of the sender
  • Verifying the authenticity of the sender
  • Digital Keys and Key Store A digital key is a kind of a password or a passphrase used incryptography calculations. A file containing a collection of public and private keys is known as a keystore. Keystore not only stores the user’s certificate with its public and private keys but also stores other’s certificates with a public key.
  • Signing a Jar File
  • Verification of Digital Certificate The recipient receives a signed JAR file and a certificate filecontaining the public key corresponding to the private key used to sign theJAR file. Import the certificate as a Trusted Certificate Verify the JAR file Signature The imported public key certificate is used to verify
  • Verification of Digital Certificate
  • Signing and Verifying Data Using Security Tools
  • Generating public and private keys A key pair generated by using the KeyPairGenerator class. Create a Key-Pair Generator Initialize the Key-Pair generator
  • Digitally signing the data Get a Signature Object Initialize the Signature Object Supply the data to be Signed to the Signature Object Generate the Signature
  • Digitally signing the data
  • Digitally signing the data
  • Verifying the signature
  • Verifying the signature