SlideShare a Scribd company logo
1 of 14
Presented By- Rupam Roy a Student of Modern Institute of Engineering & Technology
Roll No- 26900720052
Reg No- 202690100720017
Department- B.tech In Mechanical Engineering
Subject- Cyber Security (OE-ME802J)
Year- 4th
Semester- 8th
We would like to express our sincere gratitude to our respected Sir “Mr. Souvik Nandi” for
providing us the opportunity of making such an interesting presentation. We would specially
thank him for all their invaluable guidance, creative suggestions, friendly interference
throughout the entire course of this project.
Though almost all of us are acquainted with “Types of Digital Signature”, the detailed
conceptions were not known to many of us, but now it’s largely eternalized throughout the
class.At the other side many of us knew about the basic significance of working with M.S.
PowerPoint but for those who were not prepared for such experiences, this project was
absolutely important and helpful.
We would also thank to our parents & class teachers for their inestimable guidance and also
thank to our classmates for their co-operation with us.
1.Digital Signature is a type of electronic signature
that encrypts documents with digital codes that are
particularly difficult to duplicate
2.In case of digital signature message is encrypted
with the private key and decrypted with the public
key.
Digital Signature Algorithm
1. Message digest is generated using a set of Hash functions.
2. Amessage digest is encrypted using senders private key.
3. The resulting encrypted message is known as digital
signature.
4. Digital signature is attached with data or message and send
to receiver.
1.Receiver uses senders public key to decrypt senders digital
signature to obtain message digest send by receiver.
2.Receiver uses same message digest algorithm, which is used
by sender
3. Now, receiver will compare these two message digest
4. If message digest are equal then signature is valid else not.
⦁ Authentication:
◦ Identification of person sign.
⦁ Integrity od data:
◦ Every change is detected.
⦁ Non Repudiation:
◦ Author has encrypted sign on message.
⦁ Speed:
◦ Contracts are easily written, completed, and signed by all
concerned parties in a little amount of time no matter how far the
parties are geographically.
⦁ Expiry
⦁ Certificate issue procedures
⦁ Software compatibility
26900720052_OE-ME802J.pptx

More Related Content

Similar to 26900720052_OE-ME802J.pptx

Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
Maizatul Auni Bt Mazhar
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
MehediHasanShaon1
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
 

Similar to 26900720052_OE-ME802J.pptx (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docx
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
Unit v
Unit vUnit v
Unit v
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
325 330
325 330325 330
325 330
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
1.pdf
1.pdf1.pdf
1.pdf
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 

More from AtanuJana21 (11)

unit-iv-joining-process.ppt
unit-iv-joining-process.pptunit-iv-joining-process.ppt
unit-iv-joining-process.ppt
 
FINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptxFINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptx
 
_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx
 
26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx
 
ilovepdf_merged.pptx
ilovepdf_merged.pptxilovepdf_merged.pptx
ilovepdf_merged.pptx
 
presentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.pptpresentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.ppt
 
slide share.pptx.ppt
slide share.pptx.pptslide share.pptx.ppt
slide share.pptx.ppt
 
Advanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdfAdvanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdf
 
Advanced welding technology pdf.pdf
Advanced welding technology pdf.pdfAdvanced welding technology pdf.pdf
Advanced welding technology pdf.pdf
 
Economics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdfEconomics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdf
 
ELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptxELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptx
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 

26900720052_OE-ME802J.pptx

  • 1. Presented By- Rupam Roy a Student of Modern Institute of Engineering & Technology Roll No- 26900720052 Reg No- 202690100720017 Department- B.tech In Mechanical Engineering Subject- Cyber Security (OE-ME802J) Year- 4th Semester- 8th
  • 2. We would like to express our sincere gratitude to our respected Sir “Mr. Souvik Nandi” for providing us the opportunity of making such an interesting presentation. We would specially thank him for all their invaluable guidance, creative suggestions, friendly interference throughout the entire course of this project. Though almost all of us are acquainted with “Types of Digital Signature”, the detailed conceptions were not known to many of us, but now it’s largely eternalized throughout the class.At the other side many of us knew about the basic significance of working with M.S. PowerPoint but for those who were not prepared for such experiences, this project was absolutely important and helpful. We would also thank to our parents & class teachers for their inestimable guidance and also thank to our classmates for their co-operation with us.
  • 3. 1.Digital Signature is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate 2.In case of digital signature message is encrypted with the private key and decrypted with the public key.
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. 1. Message digest is generated using a set of Hash functions. 2. Amessage digest is encrypted using senders private key. 3. The resulting encrypted message is known as digital signature. 4. Digital signature is attached with data or message and send to receiver.
  • 11. 1.Receiver uses senders public key to decrypt senders digital signature to obtain message digest send by receiver. 2.Receiver uses same message digest algorithm, which is used by sender 3. Now, receiver will compare these two message digest 4. If message digest are equal then signature is valid else not.
  • 12. ⦁ Authentication: ◦ Identification of person sign. ⦁ Integrity od data: ◦ Every change is detected. ⦁ Non Repudiation: ◦ Author has encrypted sign on message. ⦁ Speed: ◦ Contracts are easily written, completed, and signed by all concerned parties in a little amount of time no matter how far the parties are geographically.
  • 13. ⦁ Expiry ⦁ Certificate issue procedures ⦁ Software compatibility