SlideShare a Scribd company logo
Presented By- Rupam Roy a Student of Modern Institute of Engineering & Technology
Roll No- 26900720052
Reg No- 202690100720017
Department- B.tech In Mechanical Engineering
Subject- Cyber Security (OE-ME802J)
Year- 4th
Semester- 8th
We would like to express our sincere gratitude to our respected Sir “Mr. Souvik Nandi” for
providing us the opportunity of making such an interesting presentation. We would specially
thank him for all their invaluable guidance, creative suggestions, friendly interference
throughout the entire course of this project.
Though almost all of us are acquainted with “Types of Digital Signature”, the detailed
conceptions were not known to many of us, but now it’s largely eternalized throughout the
class.At the other side many of us knew about the basic significance of working with M.S.
PowerPoint but for those who were not prepared for such experiences, this project was
absolutely important and helpful.
We would also thank to our parents & class teachers for their inestimable guidance and also
thank to our classmates for their co-operation with us.
1.Digital Signature is a type of electronic signature
that encrypts documents with digital codes that are
particularly difficult to duplicate
2.In case of digital signature message is encrypted
with the private key and decrypted with the public
key.
Digital Signature Algorithm
1. Message digest is generated using a set of Hash functions.
2. Amessage digest is encrypted using senders private key.
3. The resulting encrypted message is known as digital
signature.
4. Digital signature is attached with data or message and send
to receiver.
1.Receiver uses senders public key to decrypt senders digital
signature to obtain message digest send by receiver.
2.Receiver uses same message digest algorithm, which is used
by sender
3. Now, receiver will compare these two message digest
4. If message digest are equal then signature is valid else not.
⦁ Authentication:
◦ Identification of person sign.
⦁ Integrity od data:
◦ Every change is detected.
⦁ Non Repudiation:
◦ Author has encrypted sign on message.
⦁ Speed:
◦ Contracts are easily written, completed, and signed by all
concerned parties in a little amount of time no matter how far the
parties are geographically.
⦁ Expiry
⦁ Certificate issue procedures
⦁ Software compatibility
26900720052_OE-ME802J.pptx

More Related Content

Similar to 26900720052_OE-ME802J.pptx

Digital signature
Digital signatureDigital signature
Digital signature
Mohanasundaram Nattudurai
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
Chakshu Sharma
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docx
mansooraliattar
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
Maizatul Auni Bt Mazhar
 
Unit v
Unit vUnit v
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
MehediHasanShaon1
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
Matthew Chang
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
ijtsrd
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
ssusere02009
 
1.pdf
1.pdf1.pdf
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164Thivya Devaraj
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
 

Similar to 26900720052_OE-ME802J.pptx (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docx
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
Unit v
Unit vUnit v
Unit v
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
325 330
325 330325 330
325 330
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
1.pdf
1.pdf1.pdf
1.pdf
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 

More from AtanuJana21

unit-iv-joining-process.ppt
unit-iv-joining-process.pptunit-iv-joining-process.ppt
unit-iv-joining-process.ppt
AtanuJana21
 
FINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptxFINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptx
AtanuJana21
 
_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx
AtanuJana21
 
26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx
AtanuJana21
 
ilovepdf_merged.pptx
ilovepdf_merged.pptxilovepdf_merged.pptx
ilovepdf_merged.pptx
AtanuJana21
 
presentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.pptpresentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.ppt
AtanuJana21
 
slide share.pptx.ppt
slide share.pptx.pptslide share.pptx.ppt
slide share.pptx.ppt
AtanuJana21
 
Advanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdfAdvanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdf
AtanuJana21
 
Advanced welding technology pdf.pdf
Advanced welding technology pdf.pdfAdvanced welding technology pdf.pdf
Advanced welding technology pdf.pdf
AtanuJana21
 
Economics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdfEconomics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdf
AtanuJana21
 
ELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptxELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptx
AtanuJana21
 

More from AtanuJana21 (11)

unit-iv-joining-process.ppt
unit-iv-joining-process.pptunit-iv-joining-process.ppt
unit-iv-joining-process.ppt
 
FINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptxFINAL PROJECT - Business Plan.pptx
FINAL PROJECT - Business Plan.pptx
 
_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx_100 26900720052_PE-ME802I.pptx
_100 26900720052_PE-ME802I.pptx
 
26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx26900720052_PE-ME802 B.pptx
26900720052_PE-ME802 B.pptx
 
ilovepdf_merged.pptx
ilovepdf_merged.pptxilovepdf_merged.pptx
ilovepdf_merged.pptx
 
presentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.pptpresentation_new_cu_lubricants_1516085776_20707.ppt
presentation_new_cu_lubricants_1516085776_20707.ppt
 
slide share.pptx.ppt
slide share.pptx.pptslide share.pptx.ppt
slide share.pptx.ppt
 
Advanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdfAdvanced manufacturing technology pdf.pdf
Advanced manufacturing technology pdf.pdf
 
Advanced welding technology pdf.pdf
Advanced welding technology pdf.pdfAdvanced welding technology pdf.pdf
Advanced welding technology pdf.pdf
 
Economics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdfEconomics for Engineer pdf (1).pdf
Economics for Engineer pdf (1).pdf
 
ELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptxELECTRICAL_DISCHARGE_MACHINING.pptx
ELECTRICAL_DISCHARGE_MACHINING.pptx
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

26900720052_OE-ME802J.pptx

  • 1. Presented By- Rupam Roy a Student of Modern Institute of Engineering & Technology Roll No- 26900720052 Reg No- 202690100720017 Department- B.tech In Mechanical Engineering Subject- Cyber Security (OE-ME802J) Year- 4th Semester- 8th
  • 2. We would like to express our sincere gratitude to our respected Sir “Mr. Souvik Nandi” for providing us the opportunity of making such an interesting presentation. We would specially thank him for all their invaluable guidance, creative suggestions, friendly interference throughout the entire course of this project. Though almost all of us are acquainted with “Types of Digital Signature”, the detailed conceptions were not known to many of us, but now it’s largely eternalized throughout the class.At the other side many of us knew about the basic significance of working with M.S. PowerPoint but for those who were not prepared for such experiences, this project was absolutely important and helpful. We would also thank to our parents & class teachers for their inestimable guidance and also thank to our classmates for their co-operation with us.
  • 3. 1.Digital Signature is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate 2.In case of digital signature message is encrypted with the private key and decrypted with the public key.
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. 1. Message digest is generated using a set of Hash functions. 2. Amessage digest is encrypted using senders private key. 3. The resulting encrypted message is known as digital signature. 4. Digital signature is attached with data or message and send to receiver.
  • 11. 1.Receiver uses senders public key to decrypt senders digital signature to obtain message digest send by receiver. 2.Receiver uses same message digest algorithm, which is used by sender 3. Now, receiver will compare these two message digest 4. If message digest are equal then signature is valid else not.
  • 12. ⦁ Authentication: ◦ Identification of person sign. ⦁ Integrity od data: ◦ Every change is detected. ⦁ Non Repudiation: ◦ Author has encrypted sign on message. ⦁ Speed: ◦ Contracts are easily written, completed, and signed by all concerned parties in a little amount of time no matter how far the parties are geographically.
  • 13. ⦁ Expiry ⦁ Certificate issue procedures ⦁ Software compatibility