SlideShare a Scribd company logo
1 of 11
DIGITAL SIGNATURE AND
CERTIFICATE AUTHORITY
KRUTI D SHAH
MFT 1716
WHAT IS A DIGITAL SIGNATURE?
A digital signature is a mathematical technique used to validate
the authenticity and integrity of a message, software or digital
document.
The digital equivalent of a handwritten signature or stamped
seal, a digital signature offers far more inherent security, and it is
intended to solve the problem of tampering and impersonation
in digital communications.
FEATURES
Guarantees the authenticity of an electronic document or message in digital communication,
uses encryption techniques to provide proof of original and unmodified documentation.
Used in e-commerce, software distribution, financial transactions and other situations that
rely on forgery or tampering detection techniques.
Are like electronic “fingerprints.” In the form of a coded message, the digital signature
securely associates a signer with a document in a recorded transaction.
Use a standard, accepted format, called Public Key Infrastructure (PKI), to provide the highest
levels of security and universal acceptance.
HOW DOES IT WORK?
Basis Digital Signature Electronic Signature
Purpose The main purpose of a digital signature
is to secure a document so that it is not
tampered with by people without
authorization
An electronic signature is mainly used to
verify a document. The source of the
document and the authors are
identified.
Regulation Authorized and regulated by
certification authorities. These are
trusted third parties entrusted with the
duty to perform such task.
Are not regulated and this is the reason
why they are less favorable in different
states since their authenticity is
questionable. They can be easily
tampered with.
Security Comprised of more security features
that are meant to protect the document
Is less secure since it is not comprised of
viable security features that can be used
to secure it from being tampered with by
other people without permission.
PROPERTIES OF DIGITAL SIGNATURE
Authentication
Non Repudiation
Verification
Easy and Quick
Data Integrity
WHAT IS CERTIFICATE AUTHORITY?
Digital signatures rely on public and private keys which have to be protected to
ensure safety and to avoid forgery or malicious use.
A certificate authority (CA) is a trusted entity that issues digital certificates,
which are data files used to cryptographically link an entity with a public key.
Certificate authorities are a critical part of the internet's public key
infrastructure (PKI) because they issue the Secure Sockets Layer (SSL)
certificates that web browsers use to authenticate content sent from web
servers.
USES OF CERTIFICATE AUTHORITY
The best-known use of certificate authorities is for issuing SSL certificates to entities that publish content
on the web.
The three different levels of trusted certificates include:
• Extended Validation (EV)
• Organization Validated (OV)
• Domain Validated (DV)
HOW TO OBTAIN A CERTIFICATE FROM A
CERTIFICATE AUTHORITY?
CERTIFICATE AUTHORITY HIERARCHY
CAs are hierarchical in
structure. There
are generally three types
of hierarchies, and they
are denoted by the
number of tiers.
Single/One Tier
Hierarchy
Two Tier Hierarchy Three Tier Hierarchy
THANK YOU!

More Related Content

What's hot

Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)FaizahFarook
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

What's hot (20)

Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Similar to Digital signature and certificate authority

Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrysign By Exela
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfCA Divya
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 

Similar to Digital signature and certificate authority (20)

Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdfDrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
DrySign - Enhancing Online Transactions with Secure Digital Signatures.pdf
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
digital signature agency in jaipur
digital signature agency in jaipurdigital signature agency in jaipur
digital signature agency in jaipur
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdf
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 

Recently uploaded

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Digital signature and certificate authority

  • 1. DIGITAL SIGNATURE AND CERTIFICATE AUTHORITY KRUTI D SHAH MFT 1716
  • 2. WHAT IS A DIGITAL SIGNATURE? A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications.
  • 3. FEATURES Guarantees the authenticity of an electronic document or message in digital communication, uses encryption techniques to provide proof of original and unmodified documentation. Used in e-commerce, software distribution, financial transactions and other situations that rely on forgery or tampering detection techniques. Are like electronic “fingerprints.” In the form of a coded message, the digital signature securely associates a signer with a document in a recorded transaction. Use a standard, accepted format, called Public Key Infrastructure (PKI), to provide the highest levels of security and universal acceptance.
  • 4. HOW DOES IT WORK?
  • 5. Basis Digital Signature Electronic Signature Purpose The main purpose of a digital signature is to secure a document so that it is not tampered with by people without authorization An electronic signature is mainly used to verify a document. The source of the document and the authors are identified. Regulation Authorized and regulated by certification authorities. These are trusted third parties entrusted with the duty to perform such task. Are not regulated and this is the reason why they are less favorable in different states since their authenticity is questionable. They can be easily tampered with. Security Comprised of more security features that are meant to protect the document Is less secure since it is not comprised of viable security features that can be used to secure it from being tampered with by other people without permission.
  • 6. PROPERTIES OF DIGITAL SIGNATURE Authentication Non Repudiation Verification Easy and Quick Data Integrity
  • 7. WHAT IS CERTIFICATE AUTHORITY? Digital signatures rely on public and private keys which have to be protected to ensure safety and to avoid forgery or malicious use. A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key. Certificate authorities are a critical part of the internet's public key infrastructure (PKI) because they issue the Secure Sockets Layer (SSL) certificates that web browsers use to authenticate content sent from web servers.
  • 8. USES OF CERTIFICATE AUTHORITY The best-known use of certificate authorities is for issuing SSL certificates to entities that publish content on the web. The three different levels of trusted certificates include: • Extended Validation (EV) • Organization Validated (OV) • Domain Validated (DV)
  • 9. HOW TO OBTAIN A CERTIFICATE FROM A CERTIFICATE AUTHORITY?
  • 10. CERTIFICATE AUTHORITY HIERARCHY CAs are hierarchical in structure. There are generally three types of hierarchies, and they are denoted by the number of tiers. Single/One Tier Hierarchy Two Tier Hierarchy Three Tier Hierarchy