SlideShare a Scribd company logo
1
Digital Signature
2
What is
“Digital
Signature” ?
What is the
difference
between
Electronic and
Digital
Signature?
How does
it work?
How safe
is a
digital
signature
?
What is
Electronic
Signature
?
Is it hard to
use ?
Is a digital
signature
legally
enforceable
?
?
What is Digital Signature?What is Digital Signature?
 Digital Signature is a type of electronic signature that encrypts
documents with digital codes that are particularly difficult to
duplicate.
 A digital signature (standard electronic signature) takes the
concept of traditional paper-based signing and turns it into an
electronic “fingerprint.” This “fingerprint,” or coded message,
is unique to both the document and the signer and binds them
together.
 It is used to validate the authenticity and integrity of a
message, software or digital document. Digital signatures
cryptographically bind an electronic identity to an electronic
document and the signature cannot be copied to another
document.
3
4
What is Digital Signature?What is Digital Signature?
 Digital signature technique is based on public key
cryptography with a difference.
 In public key cryptography a pair of keys are used, one public
key and one private key. The public key is often used for
message encryption , and the private key is often used for
decrypting the message.
 However in case of digital signature message is encrypted with
the private key and decrypted with the public key.
 Only a specific person with the corresponding private key can
encrypt the message or in other words sign the message.
However any party who has the signatory’s public key can
encrypt the message, in other words can verify the message.
6
How to Use?How to Use?
Confidentiality IssuesConfidentiality Issues
 It should be possible for the receiver of a message to ascertain
its origin. An intruder should not be able to masquerade as
someone else.
 It should be possible for the receiver of a message to verify
that it has not been modified in transit. An intruder should not
be able to substitute a false message for a legitimate one.
 A sender should not be able to falsely deny later that he sent a
message.
Attributes of Digital SignatureAttributes of Digital Signature
 Digital signature ensures the confidentiality via the following
three attributes:
1. Authentication
2. Integrity
3. Non-repudiation
8
Attributes of Digital SignatureAttributes of Digital Signature
 Authentication: Authentication means the act of proving who
you say you are. Authentication means that you know who
created and sent the message. Digital signature is used to
authenticate the source of messages. It ensures the user of the
sender.
 Integrity: Integrity ensures that when a message is sent over a
network, the data that arrives is the same as the data that was
originally sent. Integrity is the assurance that the information is
trustworthy and accurate. Digital signature ensures the integrity
of message.
 Non-repudiation: this is an important criteria of digital
signature. As digital signature ensures the authentication of the
message, so the sender can’t repudiate it later. At the same time
it also ensures the identity of the receiver, so the receiver can’t
repudiate it later. 9
What is Electronic Signature?What is Electronic Signature?
 An electronic signature is a typed name or a scanned image of a
handwritten signature.
 As a result, e-signatures are very problematic when it comes to
maintaining integrity and security, as nothing prevents one
individual from typing another individual’s name.
 Due to this reality, an electronic signature that does not
incorporate additional measures of security (the way digital
signatures do) is considered an insecure way of signing
documentation.
10
Difference Between Digital andDifference Between Digital and
Electronic SignatureElectronic Signature
 A digital signature, often referred to as advanced or standard
version of electronic signature, that provides the highest levels
of security and universal acceptance.
 Digital signatures are based on Public Key Infrastructure (PKI)
technology, and guarantee signer identity and intent, data
integrity, and the non-repudiation of signed documents. The
digital signature cannot be copied, tampered with or altered.
11
Difference Between Digital andDifference Between Digital and
Electronic SignatureElectronic Signature
 In addition, because digital signatures are based on standard
PKI technology, they can be validated by anyone without the
need for proprietary verification software.
 On the other hand, there is no standard format for electronic
signatures that may be a digitized image of a handwritten
signature, a symbol, voiceprint, etc., used to identify the
author(s) of an electronic message.
 An electronic signature is vulnerable to copying and
tampering, and invites forgery. In many cases, electronic
signatures are not legally binding and will require proprietary
software to validate the e-signature.
12
Is Digital Signature LegallyIs Digital Signature Legally
Enforceable?Enforceable?
“Yes”
In 2006, The parliament of Bangladesh enacted “ICT Act 2006”,
which made signed electronic contracts and documents as legally
binding as a paper-based contract.
Today, digital signature (standard electronic signature)
solutions carry recognized legal significance, enabling
organizations to comply with regulations worldwide.
13
What is Standard?What is Standard?
 There are three algorithms that are suitable for digital
signature generation under the DSS standard.
 They are the Digital Signature Algorithm (DSA, which I will talk
about more in depth later), the RSA algorithm, and the Elliptic
Curve Digital Signature Algorithm (ECDSA).
14
Digital Signature AlgorithmDigital Signature Algorithm
15
16
1. Sender takes the input
message.
2. Digest the input message
using message digest
algorithm
3. Apply DSA (using private key)
to encrypt the digested
message. Here the digital
signature is padded into the
digested message.
4. Create a data packet using the
original message plus the
encrypted message.
5. Send the packet to the
intended receiver.
Data Packet
+
17
1. Receiver receives the
packet.
2. Separate the original
message and encrypted
message.
3. Apply message digest
algorithm on the
original message.
4. Now Apply DSA (using
public key) on the
encrypted message to
decrypt it. At this stage
the digital signature is
removed from the
message and we get
digested message.
5. Then compare them
Data Packet
+ Separate two parts
DSA: ParametersDSA: Parameters
 Signature Computation: A DSA digital signature is computed
using a set of domain parameters:
1. A private key x,
2. A per-message or data secret number k,
3. Data to be signed,
4. And a hash function.
 Signature Verification: A digital signature is verified using the
same domain parameters:
1. A public key y that is mathematically associated with
the private key x used to generate the digital signature,
2. Data to be verified,
3. And the same hash function that was used during
signature generation. 18
DSA: ParametersDSA: Parameters
 These parameters are defined as follows:
 The first three parameters, p, q, and g, are public and can be
common across a network of users. x is private and y is public key.
19
DSA: ParametersDSA: Parameters
 Selection of Parameter Sizes and Hash Functions for DSA
20
DSA: How Signature isDSA: How Signature is
Generated by the Sender ?Generated by the Sender ?
 Let N be the bit length of q. And let min(N, outlen) denote the
minimum of the positive integers N and outlen. Outlen is the bit
length of the hash function output block.
 The signature of a message m consists of the pair of numbers r
and s that is computed according to the following equations:
r = (gk
mod p) mod q
z= H(m) [z = the leftmost min(N, outlen) bits of Hash(m)]
s = (k-1
(H(m) + xr) ) mod q.
 When computing s, the string z obtained from Hash(m) is
converted to an integer.
 (r , s) is considered to be the signature of the sender.
21
DSA: How Signature isDSA: How Signature is
Generated by the Sender ?Generated by the Sender ?
 The values of r and s shall be checked to determine if r = 0 or
s = 0.
 If either r = 0 or s = 0, a new value of k shall be generated,
and the signature shall be recalculated.
 It is extremely rare that r = 0 or s = 0 if signatures are
generated properly.
 The signature (r, s) is transmitted along with the message to
the verifier.
22
DSA: How Signature isDSA: How Signature is
Verified by the Receiver ?Verified by the Receiver ?
 Signature verification may be performed by any party the
signatory (sender), the intended receiver or any other party
using the signatory’s public key.
 A signatory may wish to verify that the computed signature is
correct or not, before sending the signed message to the
intended receiver.
 The intended receiver (or any other party) verifies the
signature to determine its authenticity upon on receiving the
message.
23
DSA: How Signature isDSA: How Signature is
Verified by the Receiver ?Verified by the Receiver ?
 Let m', r', and s' is the received versions of m, r, and s,
respectively. If every thing goes right then m‘=m, r‘=r, and s‘=s.
 Let y be the public key of the claimed signatory and let N be the
bit length of q.
 Also, let min(N, outlen) denote the minimum of the positive
integers N and outlen, where outlen is the bit length of the hash
function output block.
 The signature verification process is as follows:
– The verifier will check that 0 < r' < q and 0 < s' < q. If either
condition is violated, the signature shall be rejected as
invalid.
24
DSA: How Signature isDSA: How Signature is
Verified by the Receiver ?Verified by the Receiver ?
2. If the two conditions in step 1 are satisfied, the verifier
computes the following:
w = (s')–1
mod q.
z = H(m' )
u1 = (z * w) mod q = (H(m' ) * w) mod q
u2 = (r' * w) mod q.
v = [ ( (gu1
* yu2
) mod p) mod q ]
The string z obtained from Hash(m') is converted to an integer
2. If v = r', then the signature considered to be verified.
If m' = m, r' = r, and s'= s then v = r‘.
3. If v ≠ r', then the message or the signature may have been
modified. The signature is considered invalid. 25
ExampleExample
 Alice wants to send message m to Bob.
 Sender side:
1. Alice generates a random number, k, less than
2. Alice generates
r = (gk
mod p) mod q
s = (k-1
(H(m) + xr)) mod q
1. The parameters (r,s) are her signature; she sends these to
bob along with the signed message m'.
26
ExampleExample
 Receiver Side:
1. Let bob received the message and signatures as m', r', and s‘.
Then Bob verifies the signature by computing:
w = (s')–1
mod q.
z = H(m' )
u1 = (z * w) mod q = (H(m' ) * w) mod q
u2 = (r' * w) mod q.
v = [ ( (gu1
* yu2
) mod p) mod q ]
2. If v = r', then the signature and message considered to be
authenticated.
3. If v ≠ r', The signature and message is considered invalid.
27
ReferencesReferences
 http://en.wikipedia.org/wiki/
 Applied Cryptography by Bruce Schneier; 10th
Anniversary edition
 FIPS PUB 186-3; FEDERAL INFORMATION PROCESSING
STANDARDS PUBLICATION
29
Md. Shakhawat Hossain
Student of Department of Computer Science &
Engineering
University of Rajshahi
E-mail: mshimul86@gmail.com

More Related Content

What's hot

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital signature
Digital signatureDigital signature
Digital signature
Abdullah Khosa
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
SHUBHA CHATURVEDI
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 

What's hot (20)

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management
Key managementKey management
Key management
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Amir Masinaei
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
هيثم فرج
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Aes
AesAes
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
Agung Julisman
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 

Viewers also liked (19)

Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Aes
AesAes
Aes
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Cryptography
CryptographyCryptography
Cryptography
 
Aes
AesAes
Aes
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
DES
DESDES
DES
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 

Similar to Digital signature

digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
jayarao21
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
D.Silpa
D.SilpaD.Silpa
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly
 
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Unit v
Unit vUnit v
Ds over
Ds overDs over
Ds over
jolly9293
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
DSC Delhi
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
ravik09783
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
 

Similar to Digital signature (20)

digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Unit v
Unit vUnit v
Unit v
 
Ds over
Ds overDs over
Ds over
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Ao318992
Ao318992Ao318992
Ao318992
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 

More from Hossain Md Shakhawat

Recipe for the effective presentaion
Recipe for the effective presentaionRecipe for the effective presentaion
Recipe for the effective presentaion
Hossain Md Shakhawat
 
The Road to Higher study in Japan
The Road to Higher study in JapanThe Road to Higher study in Japan
The Road to Higher study in Japan
Hossain Md Shakhawat
 
Application of dfs
Application of dfsApplication of dfs
Application of dfs
Hossain Md Shakhawat
 
Breadth first search and depth first search
Breadth first search and  depth first searchBreadth first search and  depth first search
Breadth first search and depth first search
Hossain Md Shakhawat
 
Islamic jurisprudence
Islamic jurisprudenceIslamic jurisprudence
Islamic jurisprudence
Hossain Md Shakhawat
 
Introduction to Medical Imaging
Introduction to Medical ImagingIntroduction to Medical Imaging
Introduction to Medical Imaging
Hossain Md Shakhawat
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
Hossain Md Shakhawat
 
Surah Fatiha
Surah FatihaSurah Fatiha
Surah Fatiha
Hossain Md Shakhawat
 
Hashing
HashingHashing
Decision making and looping
Decision making and loopingDecision making and looping
Decision making and looping
Hossain Md Shakhawat
 
Decision making and branching
Decision making and branchingDecision making and branching
Decision making and branching
Hossain Md Shakhawat
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Hossain Md Shakhawat
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Introduction to programming with c,
Introduction to programming with c,Introduction to programming with c,
Introduction to programming with c,
Hossain Md Shakhawat
 
Introduction to digital image processing
Introduction to digital image processingIntroduction to digital image processing
Introduction to digital image processing
Hossain Md Shakhawat
 
History of computing
History of computingHistory of computing
History of computing
Hossain Md Shakhawat
 
Introduction to Printers
Introduction to PrintersIntroduction to Printers
Introduction to Printers
Hossain Md Shakhawat
 
Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)
Hossain Md Shakhawat
 
Binary search tree(bst)
Binary search tree(bst)Binary search tree(bst)
Binary search tree(bst)
Hossain Md Shakhawat
 

More from Hossain Md Shakhawat (20)

Recipe for the effective presentaion
Recipe for the effective presentaionRecipe for the effective presentaion
Recipe for the effective presentaion
 
The Road to Higher study in Japan
The Road to Higher study in JapanThe Road to Higher study in Japan
The Road to Higher study in Japan
 
Application of dfs
Application of dfsApplication of dfs
Application of dfs
 
Breadth first search and depth first search
Breadth first search and  depth first searchBreadth first search and  depth first search
Breadth first search and depth first search
 
Islamic jurisprudence
Islamic jurisprudenceIslamic jurisprudence
Islamic jurisprudence
 
Introduction to Medical Imaging
Introduction to Medical ImagingIntroduction to Medical Imaging
Introduction to Medical Imaging
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Surah Fatiha
Surah FatihaSurah Fatiha
Surah Fatiha
 
Hashing
HashingHashing
Hashing
 
Decision making and looping
Decision making and loopingDecision making and looping
Decision making and looping
 
Decision making and branching
Decision making and branchingDecision making and branching
Decision making and branching
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Introduction to programming with c,
Introduction to programming with c,Introduction to programming with c,
Introduction to programming with c,
 
Introduction to digital image processing
Introduction to digital image processingIntroduction to digital image processing
Introduction to digital image processing
 
History of computing
History of computingHistory of computing
History of computing
 
Introduction to Printers
Introduction to PrintersIntroduction to Printers
Introduction to Printers
 
Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)
 
Binary search tree(bst)
Binary search tree(bst)Binary search tree(bst)
Binary search tree(bst)
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Digital signature

  • 2. 2 What is “Digital Signature” ? What is the difference between Electronic and Digital Signature? How does it work? How safe is a digital signature ? What is Electronic Signature ? Is it hard to use ? Is a digital signature legally enforceable ? ?
  • 3. What is Digital Signature?What is Digital Signature?  Digital Signature is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.  A digital signature (standard electronic signature) takes the concept of traditional paper-based signing and turns it into an electronic “fingerprint.” This “fingerprint,” or coded message, is unique to both the document and the signer and binds them together.  It is used to validate the authenticity and integrity of a message, software or digital document. Digital signatures cryptographically bind an electronic identity to an electronic document and the signature cannot be copied to another document. 3
  • 4. 4
  • 5. What is Digital Signature?What is Digital Signature?  Digital signature technique is based on public key cryptography with a difference.  In public key cryptography a pair of keys are used, one public key and one private key. The public key is often used for message encryption , and the private key is often used for decrypting the message.  However in case of digital signature message is encrypted with the private key and decrypted with the public key.  Only a specific person with the corresponding private key can encrypt the message or in other words sign the message. However any party who has the signatory’s public key can encrypt the message, in other words can verify the message.
  • 7. Confidentiality IssuesConfidentiality Issues  It should be possible for the receiver of a message to ascertain its origin. An intruder should not be able to masquerade as someone else.  It should be possible for the receiver of a message to verify that it has not been modified in transit. An intruder should not be able to substitute a false message for a legitimate one.  A sender should not be able to falsely deny later that he sent a message.
  • 8. Attributes of Digital SignatureAttributes of Digital Signature  Digital signature ensures the confidentiality via the following three attributes: 1. Authentication 2. Integrity 3. Non-repudiation 8
  • 9. Attributes of Digital SignatureAttributes of Digital Signature  Authentication: Authentication means the act of proving who you say you are. Authentication means that you know who created and sent the message. Digital signature is used to authenticate the source of messages. It ensures the user of the sender.  Integrity: Integrity ensures that when a message is sent over a network, the data that arrives is the same as the data that was originally sent. Integrity is the assurance that the information is trustworthy and accurate. Digital signature ensures the integrity of message.  Non-repudiation: this is an important criteria of digital signature. As digital signature ensures the authentication of the message, so the sender can’t repudiate it later. At the same time it also ensures the identity of the receiver, so the receiver can’t repudiate it later. 9
  • 10. What is Electronic Signature?What is Electronic Signature?  An electronic signature is a typed name or a scanned image of a handwritten signature.  As a result, e-signatures are very problematic when it comes to maintaining integrity and security, as nothing prevents one individual from typing another individual’s name.  Due to this reality, an electronic signature that does not incorporate additional measures of security (the way digital signatures do) is considered an insecure way of signing documentation. 10
  • 11. Difference Between Digital andDifference Between Digital and Electronic SignatureElectronic Signature  A digital signature, often referred to as advanced or standard version of electronic signature, that provides the highest levels of security and universal acceptance.  Digital signatures are based on Public Key Infrastructure (PKI) technology, and guarantee signer identity and intent, data integrity, and the non-repudiation of signed documents. The digital signature cannot be copied, tampered with or altered. 11
  • 12. Difference Between Digital andDifference Between Digital and Electronic SignatureElectronic Signature  In addition, because digital signatures are based on standard PKI technology, they can be validated by anyone without the need for proprietary verification software.  On the other hand, there is no standard format for electronic signatures that may be a digitized image of a handwritten signature, a symbol, voiceprint, etc., used to identify the author(s) of an electronic message.  An electronic signature is vulnerable to copying and tampering, and invites forgery. In many cases, electronic signatures are not legally binding and will require proprietary software to validate the e-signature. 12
  • 13. Is Digital Signature LegallyIs Digital Signature Legally Enforceable?Enforceable? “Yes” In 2006, The parliament of Bangladesh enacted “ICT Act 2006”, which made signed electronic contracts and documents as legally binding as a paper-based contract. Today, digital signature (standard electronic signature) solutions carry recognized legal significance, enabling organizations to comply with regulations worldwide. 13
  • 14. What is Standard?What is Standard?  There are three algorithms that are suitable for digital signature generation under the DSS standard.  They are the Digital Signature Algorithm (DSA, which I will talk about more in depth later), the RSA algorithm, and the Elliptic Curve Digital Signature Algorithm (ECDSA). 14
  • 15. Digital Signature AlgorithmDigital Signature Algorithm 15
  • 16. 16 1. Sender takes the input message. 2. Digest the input message using message digest algorithm 3. Apply DSA (using private key) to encrypt the digested message. Here the digital signature is padded into the digested message. 4. Create a data packet using the original message plus the encrypted message. 5. Send the packet to the intended receiver. Data Packet +
  • 17. 17 1. Receiver receives the packet. 2. Separate the original message and encrypted message. 3. Apply message digest algorithm on the original message. 4. Now Apply DSA (using public key) on the encrypted message to decrypt it. At this stage the digital signature is removed from the message and we get digested message. 5. Then compare them Data Packet + Separate two parts
  • 18. DSA: ParametersDSA: Parameters  Signature Computation: A DSA digital signature is computed using a set of domain parameters: 1. A private key x, 2. A per-message or data secret number k, 3. Data to be signed, 4. And a hash function.  Signature Verification: A digital signature is verified using the same domain parameters: 1. A public key y that is mathematically associated with the private key x used to generate the digital signature, 2. Data to be verified, 3. And the same hash function that was used during signature generation. 18
  • 19. DSA: ParametersDSA: Parameters  These parameters are defined as follows:  The first three parameters, p, q, and g, are public and can be common across a network of users. x is private and y is public key. 19
  • 20. DSA: ParametersDSA: Parameters  Selection of Parameter Sizes and Hash Functions for DSA 20
  • 21. DSA: How Signature isDSA: How Signature is Generated by the Sender ?Generated by the Sender ?  Let N be the bit length of q. And let min(N, outlen) denote the minimum of the positive integers N and outlen. Outlen is the bit length of the hash function output block.  The signature of a message m consists of the pair of numbers r and s that is computed according to the following equations: r = (gk mod p) mod q z= H(m) [z = the leftmost min(N, outlen) bits of Hash(m)] s = (k-1 (H(m) + xr) ) mod q.  When computing s, the string z obtained from Hash(m) is converted to an integer.  (r , s) is considered to be the signature of the sender. 21
  • 22. DSA: How Signature isDSA: How Signature is Generated by the Sender ?Generated by the Sender ?  The values of r and s shall be checked to determine if r = 0 or s = 0.  If either r = 0 or s = 0, a new value of k shall be generated, and the signature shall be recalculated.  It is extremely rare that r = 0 or s = 0 if signatures are generated properly.  The signature (r, s) is transmitted along with the message to the verifier. 22
  • 23. DSA: How Signature isDSA: How Signature is Verified by the Receiver ?Verified by the Receiver ?  Signature verification may be performed by any party the signatory (sender), the intended receiver or any other party using the signatory’s public key.  A signatory may wish to verify that the computed signature is correct or not, before sending the signed message to the intended receiver.  The intended receiver (or any other party) verifies the signature to determine its authenticity upon on receiving the message. 23
  • 24. DSA: How Signature isDSA: How Signature is Verified by the Receiver ?Verified by the Receiver ?  Let m', r', and s' is the received versions of m, r, and s, respectively. If every thing goes right then m‘=m, r‘=r, and s‘=s.  Let y be the public key of the claimed signatory and let N be the bit length of q.  Also, let min(N, outlen) denote the minimum of the positive integers N and outlen, where outlen is the bit length of the hash function output block.  The signature verification process is as follows: – The verifier will check that 0 < r' < q and 0 < s' < q. If either condition is violated, the signature shall be rejected as invalid. 24
  • 25. DSA: How Signature isDSA: How Signature is Verified by the Receiver ?Verified by the Receiver ? 2. If the two conditions in step 1 are satisfied, the verifier computes the following: w = (s')–1 mod q. z = H(m' ) u1 = (z * w) mod q = (H(m' ) * w) mod q u2 = (r' * w) mod q. v = [ ( (gu1 * yu2 ) mod p) mod q ] The string z obtained from Hash(m') is converted to an integer 2. If v = r', then the signature considered to be verified. If m' = m, r' = r, and s'= s then v = r‘. 3. If v ≠ r', then the message or the signature may have been modified. The signature is considered invalid. 25
  • 26. ExampleExample  Alice wants to send message m to Bob.  Sender side: 1. Alice generates a random number, k, less than 2. Alice generates r = (gk mod p) mod q s = (k-1 (H(m) + xr)) mod q 1. The parameters (r,s) are her signature; she sends these to bob along with the signed message m'. 26
  • 27. ExampleExample  Receiver Side: 1. Let bob received the message and signatures as m', r', and s‘. Then Bob verifies the signature by computing: w = (s')–1 mod q. z = H(m' ) u1 = (z * w) mod q = (H(m' ) * w) mod q u2 = (r' * w) mod q. v = [ ( (gu1 * yu2 ) mod p) mod q ] 2. If v = r', then the signature and message considered to be authenticated. 3. If v ≠ r', The signature and message is considered invalid. 27
  • 28. ReferencesReferences  http://en.wikipedia.org/wiki/  Applied Cryptography by Bruce Schneier; 10th Anniversary edition  FIPS PUB 186-3; FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION
  • 29. 29 Md. Shakhawat Hossain Student of Department of Computer Science & Engineering University of Rajshahi E-mail: mshimul86@gmail.com