SlideShare a Scribd company logo
1 of 13
Digital signature
• It is the concept of public-key encryption used for message
authentication.
• It is a technique that is used to bind the person to digital data.
• The binding is digitally verified by the receiver as well as a third party.
• To understand, let’s take a real-life example – When we go to a bank
for a deposit or withdraw money by or any action, we fill the slip and
sign the paper.
• After that, the bank office verifies the signature with their data.
• If the signature match, they processed with the action; otherwise, the
action will be rejected.
• The process happens with the digital signature.
• The difference is it verifies the signature digitally.
• A digital signature is a cryptographic value that is calculated based on
the data and the secret key of the signer.
Why do we need Digital Signature?
• 1. Message Authentication
• It ensures that the message is coming from the intended sender, not
other parties.
• It allows a receiver to verify the digital signature by using the sender’s
public key; it ensures that the signature is created only by the sender
who uses the secret private key to encrypt the message.
• 2. Non-Repudiation
• As the only sender knows the secret key, i.e. signature key, he is the
only one who can create a unique signature on the data.
• If any problem arises, the receiver can show the evidence of the data
and digital signature key to the third party.
• 3. Data Integrity
• It provides data integrity to test the modification in the message.
• If somehow, the attacker gets access to the message and modifies the
data. Verification at the receiver side will fail.
• This is because the hash value of the modified message and the
algorithm’s value will not match. In this case, the receiver can reject
the message.
How does it Work?
• The user who adopts has a pair of keys – a public key and a private
key. These keys are used for the Encryption and decryption process.
• The private key is used for the encryption, i.e., signing the signature,
or we can say that it is the signature key, and the public key is used for
the decryption, i.e. verification key.
• The user, i.e. the signer, apply the hash function on the data and
creates the hash of data.
• After that, apply a signature algorithm on both the hash value and the
signature key to create the given hash’s digital signature.
• Then the signature is appended with data, and both signature and data
are sent to the verifier over the network.
• Verifier, i.e. receiver, apply verification algorithm and verification key.
This process gives value as an output.
• Verifier also used the same hash function on the data, which the signer
uses to get the hash value.
• Then he verifies the hash value and the output, which is generated by
an algorithm.
• Based on the result, the verifier validates it. If both are the same, the
digital signature is valid; otherwise, it is invalid.
Digital signatures rely on the combination of two
concepts, public-key cryptography, and hash
functions
• Alice is sending a digitally signed but not encrypted message to Bob:
• 1: Alice generates a message digest of the original plaintext message
using a secure hash function like MD5().
• 2: Alice then encrypts the message digest using her private key. The
output is the digital signature.
• 3: Alice appends the digital signature to the plaintext message.
• 4: Alice then sends the appended message to Bob
Example
• <html>
• <body>
• <?php
• $str = "Hello BIS students";
• echo md5($str);
• ?>
•
• </body>
• </html>
• 5: Bob removes the digital signature from the appended message and
decrypts it with the public key of Alice.
• 6: Bob calculates the hash of the plaintext message with SHA3-512.
• 7: Bob then compares the decrypted message digest he received from
Alice with the message digest Bob computed. If the two digests match,
he can be assured that the message he received was sent by Alice
• The digital signature process does not provide any privacy by itself.
• It only ensures that the cryptographic goals of authentication,
integrity, and nonrepudiation are met.
• If Alice wants to ensure the privacy of her message to Bob, she could
encrypt the appended message generated in step 3 with the public key
of Bob.
• Bob then would need to first decrypt the encrypted message with his
private key before continuing with step 5

More Related Content

Similar to Digital signature.pptx

Digital signature
Digital signatureDigital signature
Digital signatureswatihans
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxtaherzamanrather
 
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringJAIGANESH SEKAR
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2limsh
 
L4 internet security
L4   internet securityL4   internet security
L4 internet securitylistergc
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,salutiontechnology
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 

Similar to Digital signature.pptx (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
 
Unit v
Unit vUnit v
Unit v
 
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems Engineering
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Network security
Network securityNetwork security
Network security
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
Digital signature
Digital signatureDigital signature
Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Genia Solution
Genia SolutionGenia Solution
Genia Solution
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 

More from DaveN31

Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptxDaveN31
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptxDaveN31
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxDaveN31
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxDaveN31
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptDaveN31
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptxDaveN31
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptDaveN31
 

More from DaveN31 (7)

Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptx
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptx
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptx
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptx
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Digital signature.pptx

  • 2. • It is the concept of public-key encryption used for message authentication. • It is a technique that is used to bind the person to digital data. • The binding is digitally verified by the receiver as well as a third party. • To understand, let’s take a real-life example – When we go to a bank for a deposit or withdraw money by or any action, we fill the slip and sign the paper.
  • 3. • After that, the bank office verifies the signature with their data. • If the signature match, they processed with the action; otherwise, the action will be rejected. • The process happens with the digital signature. • The difference is it verifies the signature digitally. • A digital signature is a cryptographic value that is calculated based on the data and the secret key of the signer.
  • 4. Why do we need Digital Signature? • 1. Message Authentication • It ensures that the message is coming from the intended sender, not other parties. • It allows a receiver to verify the digital signature by using the sender’s public key; it ensures that the signature is created only by the sender who uses the secret private key to encrypt the message.
  • 5. • 2. Non-Repudiation • As the only sender knows the secret key, i.e. signature key, he is the only one who can create a unique signature on the data. • If any problem arises, the receiver can show the evidence of the data and digital signature key to the third party.
  • 6. • 3. Data Integrity • It provides data integrity to test the modification in the message. • If somehow, the attacker gets access to the message and modifies the data. Verification at the receiver side will fail. • This is because the hash value of the modified message and the algorithm’s value will not match. In this case, the receiver can reject the message.
  • 7. How does it Work? • The user who adopts has a pair of keys – a public key and a private key. These keys are used for the Encryption and decryption process. • The private key is used for the encryption, i.e., signing the signature, or we can say that it is the signature key, and the public key is used for the decryption, i.e. verification key. • The user, i.e. the signer, apply the hash function on the data and creates the hash of data.
  • 8. • After that, apply a signature algorithm on both the hash value and the signature key to create the given hash’s digital signature. • Then the signature is appended with data, and both signature and data are sent to the verifier over the network. • Verifier, i.e. receiver, apply verification algorithm and verification key. This process gives value as an output.
  • 9. • Verifier also used the same hash function on the data, which the signer uses to get the hash value. • Then he verifies the hash value and the output, which is generated by an algorithm. • Based on the result, the verifier validates it. If both are the same, the digital signature is valid; otherwise, it is invalid.
  • 10. Digital signatures rely on the combination of two concepts, public-key cryptography, and hash functions • Alice is sending a digitally signed but not encrypted message to Bob: • 1: Alice generates a message digest of the original plaintext message using a secure hash function like MD5(). • 2: Alice then encrypts the message digest using her private key. The output is the digital signature. • 3: Alice appends the digital signature to the plaintext message. • 4: Alice then sends the appended message to Bob
  • 11. Example • <html> • <body> • <?php • $str = "Hello BIS students"; • echo md5($str); • ?> • • </body> • </html>
  • 12. • 5: Bob removes the digital signature from the appended message and decrypts it with the public key of Alice. • 6: Bob calculates the hash of the plaintext message with SHA3-512. • 7: Bob then compares the decrypted message digest he received from Alice with the message digest Bob computed. If the two digests match, he can be assured that the message he received was sent by Alice
  • 13. • The digital signature process does not provide any privacy by itself. • It only ensures that the cryptographic goals of authentication, integrity, and nonrepudiation are met. • If Alice wants to ensure the privacy of her message to Bob, she could encrypt the appended message generated in step 3 with the public key of Bob. • Bob then would need to first decrypt the encrypted message with his private key before continuing with step 5