SlideShare a Scribd company logo
POWER POINT PRESENTATION ON TOPIC:-
DIGITAL SIGNATURE
CA1 EVALUATION
NAME: AMAN SOLANKI
UNIVERSITY ROLL NO. : 32301220014
UNIVERSITY REGISTRATION NO. : 203231001210110
PAPER NAME & PAPER CODE: CYBER SECURITY (BCAC602)
CONTENTS
• INTRODUCTION
• WHAT IS DIGITAL SIGNATURE
• WHY DIGITAL SIGNATURE
• BASIC REQUIREMENTS
• HOW A DIGITAL SIGNATURE WORKS
• APPLICATION
• DRAWBACKS
• CONCLUSION
INTRODUCTION
1. “Digital Signature” is the best solution for authenticity in various fields.
2. The authenticity of many legal, financial, and other documents is done by the
presence or absence of an authorized handwritten signature.
3. A Digital signature is nothing but an attachment to any piece of electronic
information, which represents the content of the document and the identity of the
owner of that document uniquely.
WHAT IS DIGITAL SIGNATURE
• HASH VALUE OF A MESSAGE WHEN ENCRYPTED WITH THE PRIVATE KEY OF A PERSON
IS HIS DIGITAL SIGNATURE ON THAT E-DOCUMENT.
• AS THE PUBLIC KEY OF THE SIGNER IS KNOWN, ANYBODY CAN VERIFY THE
MESSAGE AND THE DIGITAL SIGNATURE.
• DIGITAL SIGNATURE OF A PERSON THEREFORE VARIES FROM DOCUMENT TO
DOCUMENT THUS ENSURING AUTHENTICITY OF EACH WORD OF THAT DOCUMENT.
WHY DIGITAL SIGNATURE
1. TO USE THE INTERNET AS THE SAFE AND SECURE MEDIUM FOR E- COMMERCE AND E-
GOVERNANCE.
2. TO PROVIDE AUTHENTICITY, INTEGRITY AND NON-REPUDIATION TO ELECTRONIC
DOCUMENTS.
BASIC REQUIREMENTS
•PRIVATE KEY :-
THE PRIVATE KEY IS ONE WHICH IS ACCESSIBLE ONLY TO THE SIGNER. IT IS USED TO GENERATE
THE DIGITAL SIGNATURE WHICH IS THEN ATTACHED TO THE MESSAGE.
•PUBLIC KEY:-
THE PUBLIC KEY IS MADE AVAILABLE TO ALL THOSE WHO RECEIVE THE SIGNED MESSAGES FROM
THE SENDER. IT IS USED FOR VERIFICATION OF THE RECEIVED MESSAGE.
HOW A DIGITAL SIGNATURE WORKS
APPLICATIONS
• SOFTWARE DISTRIBUTION
• ELECTRONIC MAIL
• DATA STORAGE
• ELECTRONIC FUNDSTRANSFER
• SMART CARDS
• MITRENET
• ISDN
• TIME STAMPED SIGNATURE
• BLIND SIGNATURES
DRAWBACKS
• THE PRIVATE KEY MUST BE KEPT IN A SECURED MANNER.
• SIGNATURE REQUIRES CONSIDERABLE AMOUNT OF TIME PERIOD FOR USING THE DIGITAL
SIGNATURE THE USER HAS TO OBTAIN PRIVATE AND PUBLIC KEY, THE RECEIVER HAS TO
OBTAIN THE DIGITAL SIGNATURE CERTIFICATE ALSO.
• THE PROCESS OF GENERATION AND VERIFICATION OF DIGITAL.
CONCLUSION
1. DIGITAL SIGNATURES ARE DIFFICULT TO UNDERSTAND.
2. DIGITAL SIGNATURES WILL BE CHAMPIONED BY MANY PLAYERS THAT THE
PUBLIC DISTRUSTS, INCLUDING NATIONAL SECURITY AGENCIES, LAW
ENFORCEMENT AGENCIES, AND CONSUMER MARKETING COMPANIES.

More Related Content

Similar to AMAN SOLANKI ca1 ppt.pdf

seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
MehediHasanShaon1
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
Ankita Dave
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
Ankita Dave
 

Similar to AMAN SOLANKI ca1 ppt.pdf (20)

seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Cryptography
CryptographyCryptography
Cryptography
 
Group 8.pptx
Group 8.pptxGroup 8.pptx
Group 8.pptx
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature agency in allahabad
digital signature agency in allahabaddigital signature agency in allahabad
digital signature agency in allahabad
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
 
E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Recently uploaded

Recently uploaded (20)

Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 

AMAN SOLANKI ca1 ppt.pdf

  • 1. POWER POINT PRESENTATION ON TOPIC:- DIGITAL SIGNATURE CA1 EVALUATION NAME: AMAN SOLANKI UNIVERSITY ROLL NO. : 32301220014 UNIVERSITY REGISTRATION NO. : 203231001210110 PAPER NAME & PAPER CODE: CYBER SECURITY (BCAC602)
  • 2. CONTENTS • INTRODUCTION • WHAT IS DIGITAL SIGNATURE • WHY DIGITAL SIGNATURE • BASIC REQUIREMENTS • HOW A DIGITAL SIGNATURE WORKS • APPLICATION • DRAWBACKS • CONCLUSION
  • 3. INTRODUCTION 1. “Digital Signature” is the best solution for authenticity in various fields. 2. The authenticity of many legal, financial, and other documents is done by the presence or absence of an authorized handwritten signature. 3. A Digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the owner of that document uniquely.
  • 4. WHAT IS DIGITAL SIGNATURE • HASH VALUE OF A MESSAGE WHEN ENCRYPTED WITH THE PRIVATE KEY OF A PERSON IS HIS DIGITAL SIGNATURE ON THAT E-DOCUMENT. • AS THE PUBLIC KEY OF THE SIGNER IS KNOWN, ANYBODY CAN VERIFY THE MESSAGE AND THE DIGITAL SIGNATURE. • DIGITAL SIGNATURE OF A PERSON THEREFORE VARIES FROM DOCUMENT TO DOCUMENT THUS ENSURING AUTHENTICITY OF EACH WORD OF THAT DOCUMENT.
  • 5. WHY DIGITAL SIGNATURE 1. TO USE THE INTERNET AS THE SAFE AND SECURE MEDIUM FOR E- COMMERCE AND E- GOVERNANCE. 2. TO PROVIDE AUTHENTICITY, INTEGRITY AND NON-REPUDIATION TO ELECTRONIC DOCUMENTS.
  • 6. BASIC REQUIREMENTS •PRIVATE KEY :- THE PRIVATE KEY IS ONE WHICH IS ACCESSIBLE ONLY TO THE SIGNER. IT IS USED TO GENERATE THE DIGITAL SIGNATURE WHICH IS THEN ATTACHED TO THE MESSAGE. •PUBLIC KEY:- THE PUBLIC KEY IS MADE AVAILABLE TO ALL THOSE WHO RECEIVE THE SIGNED MESSAGES FROM THE SENDER. IT IS USED FOR VERIFICATION OF THE RECEIVED MESSAGE.
  • 7. HOW A DIGITAL SIGNATURE WORKS
  • 8. APPLICATIONS • SOFTWARE DISTRIBUTION • ELECTRONIC MAIL • DATA STORAGE • ELECTRONIC FUNDSTRANSFER • SMART CARDS • MITRENET • ISDN • TIME STAMPED SIGNATURE • BLIND SIGNATURES
  • 9. DRAWBACKS • THE PRIVATE KEY MUST BE KEPT IN A SECURED MANNER. • SIGNATURE REQUIRES CONSIDERABLE AMOUNT OF TIME PERIOD FOR USING THE DIGITAL SIGNATURE THE USER HAS TO OBTAIN PRIVATE AND PUBLIC KEY, THE RECEIVER HAS TO OBTAIN THE DIGITAL SIGNATURE CERTIFICATE ALSO. • THE PROCESS OF GENERATION AND VERIFICATION OF DIGITAL.
  • 10. CONCLUSION 1. DIGITAL SIGNATURES ARE DIFFICULT TO UNDERSTAND. 2. DIGITAL SIGNATURES WILL BE CHAMPIONED BY MANY PLAYERS THAT THE PUBLIC DISTRUSTS, INCLUDING NATIONAL SECURITY AGENCIES, LAW ENFORCEMENT AGENCIES, AND CONSUMER MARKETING COMPANIES.