0
Digital Signatures              tnngo2@gmail.com
Need for digital signatures       are used to digitally sign messages or objects.       Ensuring message content integrity...
What is a Digital Signature made up of?      are generated by Public Key Cryptography using public and private      keys t...
Comparing Digital signatures with message digest?      A message digest is a fixed-length result of converting the content...
Working of Digital Signatures      Encryption:      Decryption:
Validating data integrity       No difference between data that is sent and received.
Drawbacks of digital signatures      Non-Repudiation             If sender lost its private key, the authenticity of all m...
Standards and Features of Digital Certificates         A Digital Certificate is a data structure with a digital signature....
Verifying the authenticity of the sender
Verifying the authenticity of the sender
Verifying the authenticity of the sender
Verifying the authenticity of the sender
Verifying the authenticity of the sender
Digital Keys and Key Store        A digital key is a kind of a password or a passphrase used incryptography calculations. ...
Signing a Jar File
Verification of Digital Certificate          The recipient receives a signed JAR file and a certificate filecontaining the...
Verification of Digital Certificate
Signing and Verifying Data Using Security Tools
Generating public and private keys      A key pair generated by using the KeyPairGenerator class.      Create a Key-Pair G...
Digitally signing the data       Get a Signature Object       Initialize the Signature Object       Supply the data to be ...
Digitally signing the data
Digitally signing the data
Verifying the signature
Verifying the signature
Upcoming SlideShare
Loading in...5
×

Jdbc 7

704

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
704
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
42
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Jdbc 7"

  1. 1. Digital Signatures tnngo2@gmail.com
  2. 2. Need for digital signatures are used to digitally sign messages or objects. Ensuring message content integrity The signature is appended at the end of message before transmission. If an encrypted message is tampered with, the digital signature becomes invalid. Verifying the authenticity of the message sender A digital signature ensures that an encrypted message cannot be deciphered by unintended recipients
  3. 3. What is a Digital Signature made up of? are generated by Public Key Cryptography using public and private keys to encrypt and decrypt messages. Public key Private key
  4. 4. Comparing Digital signatures with message digest? A message digest is a fixed-length result of converting the contents of a message into a hash-like a cyclic redundancy check. A message digest is appended at the end of a message and transmitted to validate the contents of the original message. A digital signature differs from a simple message digest in: A message digest alters the content of a message into a fixed length result. The original message content cannot be recovered from digest. A message digest does not provide secrecy but a digital signature is encrypted.
  5. 5. Working of Digital Signatures Encryption: Decryption:
  6. 6. Validating data integrity No difference between data that is sent and received.
  7. 7. Drawbacks of digital signatures Non-Repudiation If sender lost its private key, the authenticity of all messages having digital signatures using that key would have been compromised. Time Stamping do not contain any record of the date and time when a particular document was signed.
  8. 8. Standards and Features of Digital Certificates A Digital Certificate is a data structure with a digital signature. The data structure also contains information like the public key,identity of the key owner and name of certification authority who guaranteesthe authenticity of the key owner. A signature is viewed as trusted when it is generated by aCertification Authority (CA) since digitally signed data cannot be alteredwithout detection. Two types of certification standards: X.509 PGP (Pretty Good Privacy)
  9. 9. Verifying the authenticity of the sender
  10. 10. Verifying the authenticity of the sender
  11. 11. Verifying the authenticity of the sender
  12. 12. Verifying the authenticity of the sender
  13. 13. Verifying the authenticity of the sender
  14. 14. Digital Keys and Key Store A digital key is a kind of a password or a passphrase used incryptography calculations. A file containing a collection of public and private keys is known as a keystore. Keystore not only stores the user’s certificate with its public and private keys but also stores other’s certificates with a public key.
  15. 15. Signing a Jar File
  16. 16. Verification of Digital Certificate The recipient receives a signed JAR file and a certificate filecontaining the public key corresponding to the private key used to sign theJAR file. Import the certificate as a Trusted Certificate Verify the JAR file Signature The imported public key certificate is used to verify
  17. 17. Verification of Digital Certificate
  18. 18. Signing and Verifying Data Using Security Tools
  19. 19. Generating public and private keys A key pair generated by using the KeyPairGenerator class. Create a Key-Pair Generator Initialize the Key-Pair generator
  20. 20. Digitally signing the data Get a Signature Object Initialize the Signature Object Supply the data to be Signed to the Signature Object Generate the Signature
  21. 21. Digitally signing the data
  22. 22. Digitally signing the data
  23. 23. Verifying the signature
  24. 24. Verifying the signature
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×