SlideShare a Scribd company logo
1 of 21
Digital
Signature
2
Why Digital
Signature
Purpose of
Digital
Signature
What is
Digital
Signature
How the
Technology
Works
Application
History
Basic Requirements
History
Here are some of the milestones in the history of digital signature
technology:
1976: Whitfield Diffie and Martin Hellman first described the idea of a
digital signature
1977: Ronald Rivest, Adi Shamir and Len Adleman invented
the RSA algorithm, which could be used to produce a kind of primitive
digital signature.
1988: Lotus Notes 1.0, which used the RSA algorithm, became the first
widely marketed software package to offer digital signatures
 1999: The ability to embed digital signatures into documents is added
to PDF format.
2000: The ESIGN Act makes digital signatures legally binding.
2002: SIGNiX is founded and becomes the most broadly used cloud-
based digital signature software
2008: The PDF file format becomes an open standard to the
International Organization for Standardization (ISO) as ISO 32000.
Includes digital signatures as integral part of format.
What is Digital Signature
 Hash value of a message when encrypted with the private
key of a person is his digital signature on that e-
Document.
 Digital Signature of a person therefore varies from
document to document thus ensuring authenticity of each
word of that document.
 As the public key of the signer is known, anybody can
verify the message and the digital signature.
WHY DIGITAL SIGNATURE
 To provide Authenticity,
Integrity and Non-repudiation
to electronic documents.
 To use the Internet as the safe
and secure medium for e-
Commerce and e-Governance
NON-
REPUDIATI
ON
AUTHENTI
CATION
INTEG
RITY
Basic Requirements
Private key
Only signer can access
the primary key. It is used
to generate the digital
signature which is then
attached to the massage.
Public key
The public key is made
available to all those who
receive the signed
massages from the sender.
It is Used for verification
of the received massage.
Digital signature certifications
A digital signature certificate is issued by the
Certifying Authority to the applicants. For
obtaining this certificate the applicant must
produce the private key and public key pair
before the certifying authority. After checking the
functioning of the key pair the certifying
authority issues a certificate to the applicant.
How the Technology Works
Generating a
public key
and privet key
Added the
signature to
the document
Create a
digital
signature
Certificate
Authority
(CA)
User get massage
Purpose of Digital Signature
Signer authentication :
If public and private keys are associated with an identified signer, the
digital signature attributes the message to the signer. The digital signature
cannot be forged, unless the signer loses control of the private key.
Message authentication :
Digital signature identifies the signed message with far greater certainty
and precision than paper signatures. Verification reveals any tempering
since the comparison of hash result shows whether the message is the
same as when signed.
 Non-repudiation :
Creating a digital signature requires the signer to use his private key. This
alters the signer that he is consummating a transaction with legal
consequences, decreasing the chances of litigation later on.
 Integrity :
Digital signature creation and verification processes provide a high level of
assurance that the digital signature is that of the signer. Compared to
tedious and labor intensive paper methods, such as checking signature
cards, digital. Signatures yield a high degree of assurance without adding
resources for processing.
Algorithm of Digital Signature
• An algorithm provides the capability to generate and verify signature.
• Each user possesses a private and public key pair,but is not the same .
Public keys are assumed to be known to the public in general. Private
keys are never shared.
• Anyone can verify the signature of a user by employing that user
public key. Only the possessor of the user private key can perform
signature generation.
• A hash function is used in the signature generation process to obtain a
condensed version of data.
Challenges and Opportunities
The prospect of fully implementing digital signatures in general commerce
presents both benefits and costs.
The costs consist mainly of:
Institutional overhead
Subscriber and Relying Party Costs
On the plus side:
 Message integrity
 Imposters
Application
Here are some Applications of Digital Signature.
Electronic Mail
Data Storage
Electronic funds transfer
Software Distribution
Smart Cards
Mitrenet
ISDN
Time Stamped Signature
DrawbacksAlthough the digital signature technique is a very effective method of maintaining
integrity and authentication of data, there are some drawbacks associated with this
method.
1. The private key must be kept in a secured manner.
2. The process of generation and verification of digital signature requires considerable
amount of time.
3. Although digital signature provides authenticity, it does notensure secrecy of the data.
4.If a user changes his private key after every fixed interval of time, then the record of all
these changes must be kept.
5. For using the digital signature the user and receiver has to pay additional amount of
money
Conclusion
Digital signatures are difficult to understand. Digital signatures will be
championed by many players that the public distrusts, including national
security agencies, law enforcement agencies, and consumer marketing
companies. Digital signatures will inevitably be associated with cards.
Digital signatures will inevitably be associated with biometric identifiers.
As a result, it appears that digital technology is rapidly becoming pervasive,
the public not find this comforting. They will demand explicit privacy
protections, far more substantial than the weak and patchy regime that is
presently in place.
References
www.google.com
www.slideshare.com
www.Wikipedia.com
www.youtube.com
www.cisco.com
Thank you

More Related Content

What's hot

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 

Similar to Digital signatur

digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfMehediHasanShaon1
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 

Similar to Digital signatur (20)

Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Ds over
Ds overDs over
Ds over
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Digital signatur

  • 2. 2 Why Digital Signature Purpose of Digital Signature What is Digital Signature How the Technology Works Application History Basic Requirements
  • 3. History Here are some of the milestones in the history of digital signature technology: 1976: Whitfield Diffie and Martin Hellman first described the idea of a digital signature 1977: Ronald Rivest, Adi Shamir and Len Adleman invented the RSA algorithm, which could be used to produce a kind of primitive digital signature. 1988: Lotus Notes 1.0, which used the RSA algorithm, became the first widely marketed software package to offer digital signatures
  • 4.  1999: The ability to embed digital signatures into documents is added to PDF format. 2000: The ESIGN Act makes digital signatures legally binding. 2002: SIGNiX is founded and becomes the most broadly used cloud- based digital signature software 2008: The PDF file format becomes an open standard to the International Organization for Standardization (ISO) as ISO 32000. Includes digital signatures as integral part of format.
  • 5. What is Digital Signature  Hash value of a message when encrypted with the private key of a person is his digital signature on that e- Document.  Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document.  As the public key of the signer is known, anybody can verify the message and the digital signature.
  • 6. WHY DIGITAL SIGNATURE  To provide Authenticity, Integrity and Non-repudiation to electronic documents.  To use the Internet as the safe and secure medium for e- Commerce and e-Governance
  • 8. Basic Requirements Private key Only signer can access the primary key. It is used to generate the digital signature which is then attached to the massage. Public key The public key is made available to all those who receive the signed massages from the sender. It is Used for verification of the received massage.
  • 9. Digital signature certifications A digital signature certificate is issued by the Certifying Authority to the applicants. For obtaining this certificate the applicant must produce the private key and public key pair before the certifying authority. After checking the functioning of the key pair the certifying authority issues a certificate to the applicant.
  • 10. How the Technology Works Generating a public key and privet key Added the signature to the document Create a digital signature Certificate Authority (CA) User get massage
  • 11.
  • 12. Purpose of Digital Signature Signer authentication : If public and private keys are associated with an identified signer, the digital signature attributes the message to the signer. The digital signature cannot be forged, unless the signer loses control of the private key. Message authentication : Digital signature identifies the signed message with far greater certainty and precision than paper signatures. Verification reveals any tempering since the comparison of hash result shows whether the message is the same as when signed.
  • 13.  Non-repudiation : Creating a digital signature requires the signer to use his private key. This alters the signer that he is consummating a transaction with legal consequences, decreasing the chances of litigation later on.  Integrity : Digital signature creation and verification processes provide a high level of assurance that the digital signature is that of the signer. Compared to tedious and labor intensive paper methods, such as checking signature cards, digital. Signatures yield a high degree of assurance without adding resources for processing.
  • 14. Algorithm of Digital Signature • An algorithm provides the capability to generate and verify signature. • Each user possesses a private and public key pair,but is not the same . Public keys are assumed to be known to the public in general. Private keys are never shared. • Anyone can verify the signature of a user by employing that user public key. Only the possessor of the user private key can perform signature generation. • A hash function is used in the signature generation process to obtain a condensed version of data.
  • 15.
  • 16. Challenges and Opportunities The prospect of fully implementing digital signatures in general commerce presents both benefits and costs. The costs consist mainly of: Institutional overhead Subscriber and Relying Party Costs On the plus side:  Message integrity  Imposters
  • 17. Application Here are some Applications of Digital Signature. Electronic Mail Data Storage Electronic funds transfer Software Distribution Smart Cards Mitrenet ISDN Time Stamped Signature
  • 18. DrawbacksAlthough the digital signature technique is a very effective method of maintaining integrity and authentication of data, there are some drawbacks associated with this method. 1. The private key must be kept in a secured manner. 2. The process of generation and verification of digital signature requires considerable amount of time. 3. Although digital signature provides authenticity, it does notensure secrecy of the data. 4.If a user changes his private key after every fixed interval of time, then the record of all these changes must be kept. 5. For using the digital signature the user and receiver has to pay additional amount of money
  • 19. Conclusion Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies. Digital signatures will inevitably be associated with cards. Digital signatures will inevitably be associated with biometric identifiers. As a result, it appears that digital technology is rapidly becoming pervasive, the public not find this comforting. They will demand explicit privacy protections, far more substantial than the weak and patchy regime that is presently in place.