SlideShare a Scribd company logo
1 of 31
What is Digital Signature
Building confidentiality
and trust
into networked transactions.
Kishankant Yadav
www.signyourdoc.com
9571333822
Encryption
It is a technique of converting plain text into
ciphertext and reconverting it into plain text.
Basic Techniques of Encryption
• Transposition Cipher
• Substitution Cipher
• Product Cipher
Basic Techniques of Encryption- Transposition Cipher
Encrypts by changing the order of characters in
the text.
• e.g. : Replace 1st character with 6th
• 2nd with 7th
• 3rd with 8th
• 4th with 9th
• 5th with 10th and so on
Basic Techniques of Encryption- Transposition Cipher
WE WILL ATTACK ON BHAI ON SUNDAY
LL ATWE WI ON BHTACK SUNDAAI ONY
TRANSPOSETRANSPOSE
Basic Techniques of Encryption- Substitution Cipher
Encrypts by replacing the characters in the text with
characters in a “Key” on the basis of some rule. e.g. :
• Key is “MANISH” and Rule is Replace all
• A in the text with M
• B with A
• C with N
• D with I
• E with S
• F with H
• G with A and so on
Basic Techniques of Encryption- Substitution Cipher
INDORE IS A GOOD CITY
DKILQS DR M BLLI NDTY
SUBSTITUTESUBSTITUTE
Basic Techniques of Encryption- Product Cipher
Combination of Transposition and Substitution
• Take a Key
• replace the characters in the text with characters in
the Key.
• Transpose the result.
Basic Techniques of Encryption- Product Cipher
INDORE IS A GOOD CITY
DKILQS DR M BLLI NDTY
SUBSTITUTESUBSTITUTE
TRANSPOSETRANSPOSE
S DR DKILQI NDTM BLLY
Elements of Encryption
Encryption
method
Decryption
methodPlain
text
Plain
text
Encryption
key
Decryption
KeyCipher text
• Encryption Algorithm (function used to encrypt or decrypt)
• Encryption keys (information used to cipher)
Good Encryption System: Features
• Short Key
•Strong Algorithm
•High work factor
•Low error propagation
Encryption
Building
confidentiality
and trust
into networked
transactions.
CHANGING THE WAYCHANGING THE WAY
OF DOING BUSINESSOF DOING BUSINESS
A MATTER OF TRUST
• Building Trust: Direct trust relationship
Using Encryption
Some every day transactions:
Credit Card
Contract
Notarized
Notarized
Document
Medical
Records
Why do we place trust
in these transactions?
• Authentication
• Confidentiality
• Integrity
• Non-repudiation
Ways of Encryption
Two ways of encryption
Symmetric Key or
Private Key Encryption
Asymmetric Key or
Public Key Encryption
(abbreviated as PKI)
Symmetric Cryptosystem
Also called private key infrastructure
Cleartext Message Cipher Text Cleartext Message
DES | RC4 DES | RC4Four score and
seven years
ago, our
forefathers
brought forth
the proposition
Four score and
seven years
ago, our
forefathers
brought forth
the proposition
sdfklj98a475$5
6jhgv98456vjnf
84576FGHH78
lfkghj-
506#6lkjg4#$5;
lkn;t7;lsk%0
Symmetric Cryptosystem
• Similar key is used for
encryption and decryption
• Both parties should know
the same key
Original
Message
Original
Message
Encrypted
Message
Encrypted
Message
Also called private key infrastructure
Secured transmission of encryption key to other person is a problem.
Asymmetric Cryptosystem
 Also called Public Key Infrastructure (PKI)
 Improvement over Private Key System
 Provides all elements expected from a secure transaction :
• Authentication
• Confidentiality
• Integrity
• Non-repudiation
 Accordingly generates :
• Signed message
• Secret message
• Signed and Secret message
Public Key System
One half of a key pair is used to encrypt,
the other half is used to decrypt.
EncryptionEncryption
Recipient’s
Public
Key
Recipient’s
Private
Key
DecryptionDecryption
Public Key Infrastructure(PKI)
 Uses a pair of keys.
 One part of pair is used for encryption
 Another part is used for decryption
 One part is kept private (called private key of a person) and
another is made public (called public key of a person)
 Any key (public or private) can be used for encryption and
then another is used for decryption
 Same key can not be used for encryption and decryption
both. There has to be combination of both keys.
Basic MethodologyBasic Methodology
Public Key Infrastructure(PKI)
To generate a secret message
 Message is encrypted by
sender with Receiver’s public
key and
 It is decrypted by receiver
with his private key.
How messages are generatedHow messages are generated
Original
Message
Encrypted
Message
Receiver’s public key
Encrypted
Message
Original
Message
Receiver’s private key
Encryption
Decryption
• ConfidentialityConfidentiality • IntegrityIntegrity
It ensures :
Public Key Infrastructure(PKI)
To generate a signed message
 Message is encrypted by
sender with Sender’s private key
and
 It is decrypted by receiver
with Sender’s public key.
How messages are generatedHow messages are generated
Original
Message
Encrypted
Message
Sender’s private key
Encrypted
Message
Original
Message
Sender’s public key
Encryption
Decryption
• AuthenticationAuthentication • Non RepudiationNon Repudiation
It ensures :
Asymmetric Cryptosystem
Original
Message
Encrypted
Message I
Sender’s private key
Encrypted
Message II
Receiver’s public key
Encrypted
Message II
Encrypted
Message I
Original
Message
Sender’s public key Receiver’s private
key
To generate a signed and
secret message :
 Message is first encrypted
by sender with Sender’s
private key.
 This encrypted message is
again encrypted with
Receiver’s public key
 It is decrypted by receiver
first with his private key and
then with sender’s public key.
How messages are generatedHow messages are generated
It ensures :
AuthenticationAuthentication Non RepudiationNon RepudiationIntegrityIntegrityConfidentialityConfidentiality
Digital Signatures
• Digital signatures are hash code of a document
encrypted with sender’s private key.
• For sending the message, first hash code of message is
generated.
• This hash code is encrypted using sender’s private key.
• The message is sent along with encrypted hash code.
• At other end, receiver decrypts hash code with sender’s
public key.
• He also on his own calculates hash code of the message
received.
• Two hash codes should tally.
AuthenticationAuthentication
It ensures :
Non RepudiationNon RepudiationIntegrityIntegrity
Basic MethodologyBasic Methodology
Digital Signatures
• In earlier process, message has been sent in clear text
form thus confidentiality has not been achieved.
• To overcome this problem, message and encrypted hash
code may be encrypted by a symmetric key.
• This symmetric key is also then encrypted with
receiver’s public key.
• All these i.e. Message and encrypted hash code which
are now encrypted with symmetric key and symmetric
key itself which is now encrypted with receiver’s public
key, are sent to receiver.
• Receiver first decrypt the symmetric key with his private
key and then decrypt message and hash code with this
symmetric key.
How does PKI work?
Original
Message
Encrypted
& Signed
Sender’s
Private KeyHash Code
Digital
Signature
Symmetric Key
Recipient’s
Public Key
Encrypted
Symmetric
KeySender
Original
Message
How does PKI work?
Encrypted
& Signed
Symmetric KeyEncrypted
Symmetric
Key
Recipient’s
Private Key
Original
Message
Hash
Algorithm
Hash CodeDigital
Signature
Sender’s
Public Key
Message
verified
Recipient
private
Certificate ties a
participant to public key
The authenticity of the
certificate is guaranteed
by the digital signature
generated using the
CA’s private key.
Validity Period
Expires: 31 December 2022
Public Key:
Signed: CA’s
Signature
Name: Prashant Mali
Number: 2564567A
ID Number & Name
A Digital Certificate is a digitally signed document
that associates a public key with a user.
Digital Certificate
Key Lifecycle Management
Key Generation
Certificate Issuance
Key Usage
or
Certificate Validation
Key Expiry
Key Update
Encryption Standard
Data Encryption standard
• A short key, strong algorithm system
• Uses a 64 bit key, 56 bits for algorithm and 8 bits are
parity
RSA (Rivest, Shamir, Adalman)
• Public key system.
• Once private key is used to encrypt, it can be
decrypted only using its public key and vice-versa.
Thank You
Questions
Contact:
www.signyourdoc.com
Kishan.kant03@gmail.com
Cell: 9571333822

More Related Content

What's hot

What's hot (17)

Email Security
Email SecurityEmail Security
Email Security
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber public key cryptography
Cyber public key cryptographyCyber public key cryptography
Cyber public key cryptography
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography Unchained - BeeBryte (White Paper)
Cryptography Unchained - BeeBryte (White Paper) Cryptography Unchained - BeeBryte (White Paper)
Cryptography Unchained - BeeBryte (White Paper)
 
Blockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indyBlockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indy
 
cryptography
cryptographycryptography
cryptography
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Security
SecuritySecurity
Security
 
Pgp
PgpPgp
Pgp
 

Viewers also liked

라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅
라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅
라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅hgjdfgnbvfd
 
Formula 1 race australian gp online
Formula 1 race australian gp onlineFormula 1 race australian gp online
Formula 1 race australian gp onlinecllifordlikes
 
RPP engineering presentation
RPP engineering presentationRPP engineering presentation
RPP engineering presentationMichael Audy
 
Implementing Bullying Prevention
Implementing Bullying Prevention Implementing Bullying Prevention
Implementing Bullying Prevention LaTanya Williams
 
Proyección del Uptime Institute hacia Latinoamérica
Proyección del Uptime Institute hacia LatinoaméricaProyección del Uptime Institute hacia Latinoamérica
Proyección del Uptime Institute hacia LatinoaméricaData Center Consultores
 
Vodafone Egypt - strategic management analysis
Vodafone Egypt - strategic management analysisVodafone Egypt - strategic management analysis
Vodafone Egypt - strategic management analysisAhmed Fadl
 

Viewers also liked (11)

라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅
라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅
라인배팅∞【kId85.COM】∞ 온라인배팅 온라인배팅
 
MatSciLR5
MatSciLR5MatSciLR5
MatSciLR5
 
Formula 1 race australian gp online
Formula 1 race australian gp onlineFormula 1 race australian gp online
Formula 1 race australian gp online
 
Horno Smeg S20XMF-8
Horno Smeg S20XMF-8Horno Smeg S20XMF-8
Horno Smeg S20XMF-8
 
Azbuka
AzbukaAzbuka
Azbuka
 
Virtualización para la Eficiencia
Virtualización para la EficienciaVirtualización para la Eficiencia
Virtualización para la Eficiencia
 
RPP engineering presentation
RPP engineering presentationRPP engineering presentation
RPP engineering presentation
 
Implementing Bullying Prevention
Implementing Bullying Prevention Implementing Bullying Prevention
Implementing Bullying Prevention
 
Proyección del Uptime Institute hacia Latinoamérica
Proyección del Uptime Institute hacia LatinoaméricaProyección del Uptime Institute hacia Latinoamérica
Proyección del Uptime Institute hacia Latinoamérica
 
1 preescolar 12 13 a
1 preescolar 12 13 a1 preescolar 12 13 a
1 preescolar 12 13 a
 
Vodafone Egypt - strategic management analysis
Vodafone Egypt - strategic management analysisVodafone Egypt - strategic management analysis
Vodafone Egypt - strategic management analysis
 

Similar to Whatisdigitalsignature

What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptxDaveN31
 
Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013javagroup2006
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1AsrithaKorupolu
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 

Similar to Whatisdigitalsignature (20)

What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
 
Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 

More from Kishankant Yadav

Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signatureKishankant Yadav
 
How to Unlock epass 2003 USB Token Online
How to Unlock epass 2003 USB Token OnlineHow to Unlock epass 2003 USB Token Online
How to Unlock epass 2003 USB Token OnlineKishankant Yadav
 

More from Kishankant Yadav (6)

Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signature
 
How to Unlock epass 2003 USB Token Online
How to Unlock epass 2003 USB Token OnlineHow to Unlock epass 2003 USB Token Online
How to Unlock epass 2003 USB Token Online
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 

Whatisdigitalsignature

  • 1. What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav www.signyourdoc.com 9571333822
  • 2. Encryption It is a technique of converting plain text into ciphertext and reconverting it into plain text.
  • 3. Basic Techniques of Encryption • Transposition Cipher • Substitution Cipher • Product Cipher
  • 4. Basic Techniques of Encryption- Transposition Cipher Encrypts by changing the order of characters in the text. • e.g. : Replace 1st character with 6th • 2nd with 7th • 3rd with 8th • 4th with 9th • 5th with 10th and so on
  • 5. Basic Techniques of Encryption- Transposition Cipher WE WILL ATTACK ON BHAI ON SUNDAY LL ATWE WI ON BHTACK SUNDAAI ONY TRANSPOSETRANSPOSE
  • 6. Basic Techniques of Encryption- Substitution Cipher Encrypts by replacing the characters in the text with characters in a “Key” on the basis of some rule. e.g. : • Key is “MANISH” and Rule is Replace all • A in the text with M • B with A • C with N • D with I • E with S • F with H • G with A and so on
  • 7. Basic Techniques of Encryption- Substitution Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTESUBSTITUTE
  • 8. Basic Techniques of Encryption- Product Cipher Combination of Transposition and Substitution • Take a Key • replace the characters in the text with characters in the Key. • Transpose the result.
  • 9. Basic Techniques of Encryption- Product Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTESUBSTITUTE TRANSPOSETRANSPOSE S DR DKILQI NDTM BLLY
  • 10. Elements of Encryption Encryption method Decryption methodPlain text Plain text Encryption key Decryption KeyCipher text • Encryption Algorithm (function used to encrypt or decrypt) • Encryption keys (information used to cipher)
  • 11. Good Encryption System: Features • Short Key •Strong Algorithm •High work factor •Low error propagation
  • 12. Encryption Building confidentiality and trust into networked transactions. CHANGING THE WAYCHANGING THE WAY OF DOING BUSINESSOF DOING BUSINESS
  • 13. A MATTER OF TRUST • Building Trust: Direct trust relationship Using Encryption
  • 14. Some every day transactions: Credit Card Contract Notarized Notarized Document Medical Records Why do we place trust in these transactions? • Authentication • Confidentiality • Integrity • Non-repudiation
  • 15. Ways of Encryption Two ways of encryption Symmetric Key or Private Key Encryption Asymmetric Key or Public Key Encryption (abbreviated as PKI)
  • 16. Symmetric Cryptosystem Also called private key infrastructure Cleartext Message Cipher Text Cleartext Message DES | RC4 DES | RC4Four score and seven years ago, our forefathers brought forth the proposition Four score and seven years ago, our forefathers brought forth the proposition sdfklj98a475$5 6jhgv98456vjnf 84576FGHH78 lfkghj- 506#6lkjg4#$5; lkn;t7;lsk%0
  • 17. Symmetric Cryptosystem • Similar key is used for encryption and decryption • Both parties should know the same key Original Message Original Message Encrypted Message Encrypted Message Also called private key infrastructure Secured transmission of encryption key to other person is a problem.
  • 18. Asymmetric Cryptosystem  Also called Public Key Infrastructure (PKI)  Improvement over Private Key System  Provides all elements expected from a secure transaction : • Authentication • Confidentiality • Integrity • Non-repudiation  Accordingly generates : • Signed message • Secret message • Signed and Secret message
  • 19. Public Key System One half of a key pair is used to encrypt, the other half is used to decrypt. EncryptionEncryption Recipient’s Public Key Recipient’s Private Key DecryptionDecryption
  • 20. Public Key Infrastructure(PKI)  Uses a pair of keys.  One part of pair is used for encryption  Another part is used for decryption  One part is kept private (called private key of a person) and another is made public (called public key of a person)  Any key (public or private) can be used for encryption and then another is used for decryption  Same key can not be used for encryption and decryption both. There has to be combination of both keys. Basic MethodologyBasic Methodology
  • 21. Public Key Infrastructure(PKI) To generate a secret message  Message is encrypted by sender with Receiver’s public key and  It is decrypted by receiver with his private key. How messages are generatedHow messages are generated Original Message Encrypted Message Receiver’s public key Encrypted Message Original Message Receiver’s private key Encryption Decryption • ConfidentialityConfidentiality • IntegrityIntegrity It ensures :
  • 22. Public Key Infrastructure(PKI) To generate a signed message  Message is encrypted by sender with Sender’s private key and  It is decrypted by receiver with Sender’s public key. How messages are generatedHow messages are generated Original Message Encrypted Message Sender’s private key Encrypted Message Original Message Sender’s public key Encryption Decryption • AuthenticationAuthentication • Non RepudiationNon Repudiation It ensures :
  • 23. Asymmetric Cryptosystem Original Message Encrypted Message I Sender’s private key Encrypted Message II Receiver’s public key Encrypted Message II Encrypted Message I Original Message Sender’s public key Receiver’s private key To generate a signed and secret message :  Message is first encrypted by sender with Sender’s private key.  This encrypted message is again encrypted with Receiver’s public key  It is decrypted by receiver first with his private key and then with sender’s public key. How messages are generatedHow messages are generated It ensures : AuthenticationAuthentication Non RepudiationNon RepudiationIntegrityIntegrityConfidentialityConfidentiality
  • 24. Digital Signatures • Digital signatures are hash code of a document encrypted with sender’s private key. • For sending the message, first hash code of message is generated. • This hash code is encrypted using sender’s private key. • The message is sent along with encrypted hash code. • At other end, receiver decrypts hash code with sender’s public key. • He also on his own calculates hash code of the message received. • Two hash codes should tally. AuthenticationAuthentication It ensures : Non RepudiationNon RepudiationIntegrityIntegrity Basic MethodologyBasic Methodology
  • 25. Digital Signatures • In earlier process, message has been sent in clear text form thus confidentiality has not been achieved. • To overcome this problem, message and encrypted hash code may be encrypted by a symmetric key. • This symmetric key is also then encrypted with receiver’s public key. • All these i.e. Message and encrypted hash code which are now encrypted with symmetric key and symmetric key itself which is now encrypted with receiver’s public key, are sent to receiver. • Receiver first decrypt the symmetric key with his private key and then decrypt message and hash code with this symmetric key.
  • 26. How does PKI work? Original Message Encrypted & Signed Sender’s Private KeyHash Code Digital Signature Symmetric Key Recipient’s Public Key Encrypted Symmetric KeySender Original Message
  • 27. How does PKI work? Encrypted & Signed Symmetric KeyEncrypted Symmetric Key Recipient’s Private Key Original Message Hash Algorithm Hash CodeDigital Signature Sender’s Public Key Message verified Recipient
  • 28. private Certificate ties a participant to public key The authenticity of the certificate is guaranteed by the digital signature generated using the CA’s private key. Validity Period Expires: 31 December 2022 Public Key: Signed: CA’s Signature Name: Prashant Mali Number: 2564567A ID Number & Name A Digital Certificate is a digitally signed document that associates a public key with a user. Digital Certificate
  • 29. Key Lifecycle Management Key Generation Certificate Issuance Key Usage or Certificate Validation Key Expiry Key Update
  • 30. Encryption Standard Data Encryption standard • A short key, strong algorithm system • Uses a 64 bit key, 56 bits for algorithm and 8 bits are parity RSA (Rivest, Shamir, Adalman) • Public key system. • Once private key is used to encrypt, it can be decrypted only using its public key and vice-versa.