SlideShare a Scribd company logo
Digital Certificates
         &
Digital signatures
What is a digital signature ?
• A digital signature is a mathematical scheme for
  demonstrating the authenticity of a digital message or
  document.
• A valid digital signature gives a recipient reason to
  believe that the message was created by a known
  sender, and that it was not altered in transit.
• Digital signatures are commonly used for software
  distribution, financial transactions, and in other cases
  where it is important to detect forgery or tampering.
INTRODUCTION
• Digital signatures employ a type of asymmetric
  cryptography.
• For messages sent through a nonsecure channel, a
  properly implemented digital signature gives the
  receiver reason to believe the message was sent by
  the claimed sender.
• Digital signature schemes in the sense used here are
  cryptographically based, and must be implemented
  properly to be effective.
• Digitally signed messages may be anything
  representable as a bitstring: examples include
  electronic mail, contracts, or a message sent via some
  other cryptographic protocol
• A digital signature scheme typically consists of three
  algorithms:
• A key generation algorithm that selects a private key
  uniformly at random from a set of possible private
  keys. The algorithm outputs the private key and a
  corresponding public key.
• A signing algorithm that, given a message and a
  private key, produces a signature.
• A signature verifying algorithm that, given a
  message, public key and a signature, either accepts or
  rejects the message's claim to authenticity.

• Two main properties are required. First, a signature
  generated from a fixed message and fixed private key
  should verify the authenticity of that message by
  using the corresponding public key. Secondly, it
  should be computationally infeasible to generate a
  valid signature for a party who does not possess the
  private key.
Uses of Digital Signatures
• Now a days, organisations are moving away
  from paper documents with ink signatures or
  authenticity stamps, to digital signatures.

• It can provide added assurances of the evidence to
  provenance, identity, and status of an electronic
  document as well as acknowledging consent and
  approval by a signatory.
• Below are some common reasons for applying a
  digital signature to communications.

• Authentication:-
  - Digital signatures can be used to authenticate the
  source of messages.
  -For example, suppose a bank's branch office sends
  instructions to the central office requesting a change
  in the balance of an account.

• Integrity:-
  ▫ The sender and receiver of a message must know
    that the message has not been altered during
    transmission.
• However, if a message is digitally signed, any change
  in the message after signature will invalidate the
  signature.

• Non-repudiation:-
  ▫ An entity that has signed some information cannot
    at a later time deny having signed it. Similarly,
    access to the public key only does not enable a
    fraudulent party to fake a valid sign
Additional Security Precautions
• Using smart card readers with a separate
  keyboard:-
  ▫ Some card readers have their own numeric
    keypad. This is safer than using a card reader
    integrated into a PC, and then entering the PIN
    using that computer's keyboard.
• Using digital signatures only with trusted
  applications:-
      One of the main differences between a digital
  signature and a written signature is that the user does
  not "see" what he signs.
WYSIWYS
• WYSIWYS is an shortform for What You See Is
  What You Sign, used to describe the property of
  digital signatures systems that the content of signed
  messages can not be changed, either by accident or
  intent.
• What You See Is What You Sign means that the
  semantic interpretation of a signed message cannot be
  changed.
Digital signatures vs. ink on paper signatures

• Ink Paper Signatures     • Digital Signatures
• An ink signature could   • Digital signatures bind
  be replicated from one     an electronic identity to
  document to another by     an electronic document
  copying the image          and the digital signature
  manually or digitally.     cannot be copied to
                             another document.
• Ink Signatures can be    • Digital signatures can
  easilly erasiable.         never be erased.
What is Private Key & Public Key ???

• Cryptographic system requiring two separate Keys,
  one to lock or encrypt the Plaintext, and one to
  unlock or decrypt the Cyber text.
• One of these keys is published or public and the
  other is kept private.
• a private key, which only you use. and
• a public key, which other people use.
Example:       (B's public key)




           B
               (B's private key)
B’s Co-workers




                                                               Z
            X                       Y



 B’s Public Key

 Anyone can get B's Public Key, but B keeps his Private Key to himself
"Hey B, how   HNFmsEm6Un
     are you ?”    BejhhyCGKOK



Z




    HNFmsEm6U
    n              "Hey B, how
    BejhhyCGKOB    are you ?”
    cyLK


B
Bob Info:
  Name
  Department
  Cubical Number
Certificate Info:
  Expiration Date
  Serial Number
Bob's Public Key:




                    B’s Co-Worker
Why we use digital signature?
• Guarantees that the person who sent the message is
  really the one who sent it.

• By placing the digital signature on a document proves
  not only the document is for real, but it also shows
  that the signature is not fake or forgery.

• insures data Integrity giving the user piece of mind
  that the message or transaction has not been
  accidentally or maliciously altered.
• ensures confidentiality and ensures that messages can
  only be read by authorized intended recipients.

• also verifies date and time so that senders or
  recipients can not dispute if the message was actually
  sent or received.
• The process of checking the validity of digital
  signature.

• Advantages
  1) Imposter Prevention
  2) Message Integrity
  3) Legal Requirement

More Related Content

What's hot

Digital signature
Digital signatureDigital signature
Digital signature
Mohanasundaram Nattudurai
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Ehtisham Ali
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
Sumant Diwakar
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
Devam Shah
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
MSA Technosoft
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
Digital signature
Digital signatureDigital signature
Digital signature
Abdullah Khosa
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Viewers also liked

Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signaturesphanleson
 
Twitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter todayTwitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter today
Rahmatullah Akbar
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 
SSLCertificate101
SSLCertificate101SSLCertificate101
SSLCertificate101
Teerayut Hiruntaraporn
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
Anshuman Sinha
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signatureNetri Chowdhary
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
Venkatesh Iyer
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signaturePSPCL
 
Introduction to Apache Spark
Introduction to Apache SparkIntroduction to Apache Spark
Introduction to Apache Spark
Rahul Jain
 

Viewers also liked (10)

Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signatures
 
Twitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter todayTwitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter today
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
SSLCertificate101
SSLCertificate101SSLCertificate101
SSLCertificate101
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Introduction to Apache Spark
Introduction to Apache SparkIntroduction to Apache Spark
Introduction to Apache Spark
 

Similar to Digital certificates

Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
ravik09783
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
taherzamanrather
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
DaveN31
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
amshal
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
Ranga91
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Bitcoin Association of Australia
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
D.Silpa
D.SilpaD.Silpa
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Genia Solution
Genia SolutionGenia Solution
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
RajanGoyal16
 

Similar to Digital certificates (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Cryptography
CryptographyCryptography
Cryptography
 
Genia Solution
Genia SolutionGenia Solution
Genia Solution
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Digital certificates

  • 1. Digital Certificates & Digital signatures
  • 2. What is a digital signature ? • A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. • A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. • Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
  • 3. INTRODUCTION • Digital signatures employ a type of asymmetric cryptography. • For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. • Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective.
  • 4. • Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol • A digital signature scheme typically consists of three algorithms: • A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. • A signing algorithm that, given a message and a private key, produces a signature.
  • 5. • A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity. • Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.
  • 6.
  • 7. Uses of Digital Signatures • Now a days, organisations are moving away from paper documents with ink signatures or authenticity stamps, to digital signatures. • It can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging consent and approval by a signatory.
  • 8. • Below are some common reasons for applying a digital signature to communications. • Authentication:- - Digital signatures can be used to authenticate the source of messages. -For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. • Integrity:- ▫ The sender and receiver of a message must know that the message has not been altered during transmission.
  • 9. • However, if a message is digitally signed, any change in the message after signature will invalidate the signature. • Non-repudiation:- ▫ An entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid sign
  • 10. Additional Security Precautions • Using smart card readers with a separate keyboard:- ▫ Some card readers have their own numeric keypad. This is safer than using a card reader integrated into a PC, and then entering the PIN using that computer's keyboard. • Using digital signatures only with trusted applications:- One of the main differences between a digital signature and a written signature is that the user does not "see" what he signs.
  • 11. WYSIWYS • WYSIWYS is an shortform for What You See Is What You Sign, used to describe the property of digital signatures systems that the content of signed messages can not be changed, either by accident or intent. • What You See Is What You Sign means that the semantic interpretation of a signed message cannot be changed.
  • 12. Digital signatures vs. ink on paper signatures • Ink Paper Signatures • Digital Signatures • An ink signature could • Digital signatures bind be replicated from one an electronic identity to document to another by an electronic document copying the image and the digital signature manually or digitally. cannot be copied to another document. • Ink Signatures can be • Digital signatures can easilly erasiable. never be erased.
  • 13. What is Private Key & Public Key ??? • Cryptographic system requiring two separate Keys, one to lock or encrypt the Plaintext, and one to unlock or decrypt the Cyber text. • One of these keys is published or public and the other is kept private. • a private key, which only you use. and • a public key, which other people use.
  • 14. Example: (B's public key) B (B's private key)
  • 15. B’s Co-workers Z X Y B’s Public Key Anyone can get B's Public Key, but B keeps his Private Key to himself
  • 16. "Hey B, how HNFmsEm6Un are you ?” BejhhyCGKOK Z HNFmsEm6U n "Hey B, how BejhhyCGKOB are you ?” cyLK B
  • 17.
  • 18.
  • 19. Bob Info: Name Department Cubical Number Certificate Info: Expiration Date Serial Number Bob's Public Key: B’s Co-Worker
  • 20. Why we use digital signature? • Guarantees that the person who sent the message is really the one who sent it. • By placing the digital signature on a document proves not only the document is for real, but it also shows that the signature is not fake or forgery. • insures data Integrity giving the user piece of mind that the message or transaction has not been accidentally or maliciously altered.
  • 21. • ensures confidentiality and ensures that messages can only be read by authorized intended recipients. • also verifies date and time so that senders or recipients can not dispute if the message was actually sent or received.
  • 22. • The process of checking the validity of digital signature. • Advantages 1) Imposter Prevention 2) Message Integrity 3) Legal Requirement