SlideShare a Scribd company logo
1 of 23
Public Integrity Auditing -
Digital Signatures
by G Jaya Rao
Roll No:716178,Research Scholar ,NITW&IDRBT,Hyd
Public Integrity Auditing -Digital
Signatures
 Digital Signatures
• MAC
 Security services provided by a digital signature
 Digital signature scheme-RSA
 Attacks on digital signatures
 Some applications of digital signatures
 References
Message Integrity-Message
Authentication Code (MAC)
 MAC algorithm is a symmetric key cryptographic
technique to provide message authentication.
 For establishing MAC process, the sender and
receiver share a symmetric key K.
 Essentially, a MAC is an encrypted checksum
generated on the underlying message that is sent
along with a message to ensure message
authentication.
MAC
30.5
The symmetric (shared) key in the
Diffie-Hellman protocol is
K = gxy mod p.
Limitations of MAC
 Establishment of Shared Secret. This requires
establishment of shared secret among pre-decided
legitimate users prior to use of MAC.
 Inability to Provide Non-Repudiation: Non-repudiation
is the assurance that a message originator cannot
deny any previously sent messages and
commitments or actions. MAC technique does not
provide a non-repudiation service.
 If the sender and receiver get involved in a dispute
over message origination, MACs cannot provide a
proof that a message was indeed sent by the sender.
Both these limitations can be overcome by using the
public key based digital signatures discussed in
following section.
DIGITAL SIGNATURES
 A person signs a document to show that it
originated from him or was approved by him.
 The signature is proof to the recipient that the
document comes from the correct entity and
nobody else.
 A sign of authentication: A verified signature on a
document.
 A message can be signed electronically.
 The electronic signature can prove the authenticity
of the sender of the message --->digital signature.
DIGITAL SIGNATURES(cont’d)
Digital signature process
Security Services
 Message authentication − When the verifier
validates the digital signature using public key of a
sender, he is assured that signature has been
created only by sender who possess the
corresponding secret private key and no one else.
 Data Integrity − In case an attacker has access to
the data and modifies it, the digital signature
verification at receiver end fails. The hash of
modified data and the output provided by the
verification algorithm will not match. Hence,
receiver can safely deny the message assuming
that data integrity has been breached.
 Non-repudiation − Since it is assumed that only
the signer has the knowledge of the signature
key, he can only create unique signature on a
given data. Thus the receiver can present data
and the digital signature to a third party as
evidence if any dispute arises in the future.
13.13
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
RSA digital signature scheme
In the RSA digital signature scheme, d is private;
e and n are public.
Note
Key-Generation for RSA
1. Generate two large random distinct primes
p and q, each roughly the same size
2. Compute n = pq and
3. Select random integer e:
4. Compute unique integer d:
5. Public key is (n, e); Private key is d
( ) ( 1)( 1)
n p q
   
1 , such that gcd( , ) 1
e e
 
  
1 , such that 1mod
d ed
 
  
13.15
RSA Signature on the Message Digest
Continued
The RSA signature on the message digest
13.16
ATTACKS ON DIGITAL SIGNATURE
APPLICATIONS …..
Electronic Mail
Data storage
Electronic funds transfer
Software Distribution
Limitations
 The private key must be kept in a secured
manner.
 The process of generation and verification of
digital signature requires considerable amount of
time.
 For using the digital signature the user has to
obtain private and public key, the receiver has to
obtain the digital signature certificate also.
digital_sign_interview.ppt

More Related Content

Similar to digital_sign_interview.ppt

CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 

Similar to digital_sign_interview.ppt (20)

CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Ch13
Ch13Ch13
Ch13
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 

More from jayarao21

databasemanagementsystempptforbeginners.ppt
databasemanagementsystempptforbeginners.pptdatabasemanagementsystempptforbeginners.ppt
databasemanagementsystempptforbeginners.pptjayarao21
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.pptjayarao21
 
6.Lab Syllabus.docx
6.Lab Syllabus.docx6.Lab Syllabus.docx
6.Lab Syllabus.docxjayarao21
 
unit5_part2.pptx
unit5_part2.pptxunit5_part2.pptx
unit5_part2.pptxjayarao21
 
CCCDjango2010.pdf
CCCDjango2010.pdfCCCDjango2010.pdf
CCCDjango2010.pdfjayarao21
 
ch2_jayarao.ppt
ch2_jayarao.pptch2_jayarao.ppt
ch2_jayarao.pptjayarao21
 
introdution-to-html_jayarao27_11_22.pptx
introdution-to-html_jayarao27_11_22.pptxintrodution-to-html_jayarao27_11_22.pptx
introdution-to-html_jayarao27_11_22.pptxjayarao21
 
MFCS PPT.pdf
MFCS PPT.pdfMFCS PPT.pdf
MFCS PPT.pdfjayarao21
 

More from jayarao21 (9)

databasemanagementsystempptforbeginners.ppt
databasemanagementsystempptforbeginners.pptdatabasemanagementsystempptforbeginners.ppt
databasemanagementsystempptforbeginners.ppt
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 
6.Lab Syllabus.docx
6.Lab Syllabus.docx6.Lab Syllabus.docx
6.Lab Syllabus.docx
 
unit5_part2.pptx
unit5_part2.pptxunit5_part2.pptx
unit5_part2.pptx
 
CCCDjango2010.pdf
CCCDjango2010.pdfCCCDjango2010.pdf
CCCDjango2010.pdf
 
ch2_jayarao.ppt
ch2_jayarao.pptch2_jayarao.ppt
ch2_jayarao.ppt
 
introdution-to-html_jayarao27_11_22.pptx
introdution-to-html_jayarao27_11_22.pptxintrodution-to-html_jayarao27_11_22.pptx
introdution-to-html_jayarao27_11_22.pptx
 
DFS.pdf
DFS.pdfDFS.pdf
DFS.pdf
 
MFCS PPT.pdf
MFCS PPT.pdfMFCS PPT.pdf
MFCS PPT.pdf
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

digital_sign_interview.ppt

  • 1. Public Integrity Auditing - Digital Signatures by G Jaya Rao Roll No:716178,Research Scholar ,NITW&IDRBT,Hyd
  • 2. Public Integrity Auditing -Digital Signatures  Digital Signatures • MAC  Security services provided by a digital signature  Digital signature scheme-RSA  Attacks on digital signatures  Some applications of digital signatures  References
  • 3. Message Integrity-Message Authentication Code (MAC)  MAC algorithm is a symmetric key cryptographic technique to provide message authentication.  For establishing MAC process, the sender and receiver share a symmetric key K.  Essentially, a MAC is an encrypted checksum generated on the underlying message that is sent along with a message to ensure message authentication.
  • 4. MAC
  • 5. 30.5 The symmetric (shared) key in the Diffie-Hellman protocol is K = gxy mod p.
  • 6.
  • 7. Limitations of MAC  Establishment of Shared Secret. This requires establishment of shared secret among pre-decided legitimate users prior to use of MAC.  Inability to Provide Non-Repudiation: Non-repudiation is the assurance that a message originator cannot deny any previously sent messages and commitments or actions. MAC technique does not provide a non-repudiation service.  If the sender and receiver get involved in a dispute over message origination, MACs cannot provide a proof that a message was indeed sent by the sender. Both these limitations can be overcome by using the public key based digital signatures discussed in following section.
  • 8. DIGITAL SIGNATURES  A person signs a document to show that it originated from him or was approved by him.  The signature is proof to the recipient that the document comes from the correct entity and nobody else.  A sign of authentication: A verified signature on a document.  A message can be signed electronically.  The electronic signature can prove the authenticity of the sender of the message --->digital signature.
  • 11. Security Services  Message authentication − When the verifier validates the digital signature using public key of a sender, he is assured that signature has been created only by sender who possess the corresponding secret private key and no one else.  Data Integrity − In case an attacker has access to the data and modifies it, the digital signature verification at receiver end fails. The hash of modified data and the output provided by the verification algorithm will not match. Hence, receiver can safely deny the message assuming that data integrity has been breached.
  • 12.  Non-repudiation − Since it is assumed that only the signer has the knowledge of the signature key, he can only create unique signature on a given data. Thus the receiver can present data and the digital signature to a third party as evidence if any dispute arises in the future.
  • 13. 13.13 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA RSA digital signature scheme In the RSA digital signature scheme, d is private; e and n are public. Note
  • 14. Key-Generation for RSA 1. Generate two large random distinct primes p and q, each roughly the same size 2. Compute n = pq and 3. Select random integer e: 4. Compute unique integer d: 5. Public key is (n, e); Private key is d ( ) ( 1)( 1) n p q     1 , such that gcd( , ) 1 e e      1 , such that 1mod d ed     
  • 15. 13.15 RSA Signature on the Message Digest Continued The RSA signature on the message digest
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. APPLICATIONS ….. Electronic Mail Data storage Electronic funds transfer Software Distribution
  • 22. Limitations  The private key must be kept in a secured manner.  The process of generation and verification of digital signature requires considerable amount of time.  For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.