SlideShare a Scribd company logo
Submitted to:-
Prof.Samta Jain
Submitted By:-
Navneet Prakash
Preeti Yadav
Aakanksha Tomar
●“A Digital Signature is an
Electronic Signature .”
To authenticate the identity of the sender of a
message
The signer of a document, and
To ensure that the original content of the message
or document that has been signed is unchanged
●Only the owner can create the digital signature,
hence it can be used to verify who created a
message
●Generally don't sign the whole message
(doubling the size of information exchanged), but
just a digest or hash of the message
●A hash function takes the message, and
produces a fixed size (typically 64 to 512 bits)
value dependent on the message
●Digital Signature - a data string which associates
a message with some originating entity
●When using a digital signature, the data itself is
not encrypted, but a hash of the data is
encrypted with a private key. A hash (also
known as a digest) is a unique, fixed-length
mathematical value that is determined by the
content of the message
●In 1976,Whitfield Diffie and Martin Hellman first
described the Digital Signature.
●In 1984, Shafi Goldwasser, Silvio Micali, and
Ronald Rivest became the first to define the
security requirements of digital signature
schemes.
Caesar Cipher
The shift is linear and equidistributed 3
changes
I agree lcdjuhhKey Cipher
The shift is linear (cyclic) 269
k.n.gupta 62 mewam3rzjba
i+3=l
Space=c
[+3]
k+2=
m
(dot)=e
[+6]
n=w
[+9]
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed
755My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb
6f25I am 20 years old.
0e6d7d56c4520756f59235b6ae981cdb5f982
0a0I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b8
93e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1
ea3
●These are digital signatures of same person on different
documents
●Digital Signatures are numbers
●Same Length – 40 digits
●They are document content
●Message
Message
+
signature
Hash
SIGN hash
With
Sender’s
Private key
Signed
Message
Sent thru’ Internet
Message
+
Signatur
e
Calculate
d
Hash
COMPARE
Ha
sh
Decrypt
Signature
With
Sender’s
Public Key
Sende
r Receive
r
if
OK
Signatures
verified
●A digital certificate is an electronic “document”
●or computer generated record that officially links
together the subscriber’s identification with the
corresponding public key.
●The certificate is digitally signed by the issuing
Certification Authority (CA ) to ensure the
certificate’s authenticity so that anyone in
possession of the CA’s public
key can verify the legitimacy of the certificate
●Certificate authorities (CA’s) will provide a requestor
with someone’s public key contained in a certificate.
Information in the certificate will identify the public
key’s owner, and provide the name of the CA who
validated the identity and signed the identity to public
key binding. In this way it is possible to see that a
certificate serves as a kind of protective “container”
for the public key, protecting the integrity of its
binding to an owner and authenticating both the
binding and identity via the reputation (and trust) of
the signing CA.
Private Key – Used for making digital signature
Public Key – Used to verify the digital signature
●If the sender wishes to prove to a recipient that
he or she is the source oftheinformation, the
sender uses his or her private key to digitally
sign a message (adigital signature).
●The receiver of a digitally signed message uses
the sender’s public key to verify the signature so
that the receiver knows that the person
controlling the private key corresponding to the
public key sent the information, and that the
received information has not been altered since
it was signed.
●A key generation algorithm that selects a private
key uniformly at random from a set of possible
private keys. The algorithm outputs the private
key and a corresponding public key.
●A signing algorithm which, given a message and
a private key, produces a signature.
●A signature verifying algorithm which given a
message, public key and a signature, either
accepts or rejects.
●To provide Authenticity, Integrity and
Non-repudiation to electronic
documents
●To use the Internet as the safe and
secure medium for e-Commerce.
●Authentication :-Although messages may often
include information about the entity sending a
message, that information may not be accurate.
Digital signatures can be used to authenticate
the source of messages. When ownership of a
digital signature secret key is bound to a specific
user, a valid signature shows that the message
was sent by that user. The importance of high
confidence in sender authenticity is especially
obvious in a financial
1.Integrity :-In many scenarios, the sender and
receiver of a message may have a need for
confidence that the message has not been
altered during transmission. Although encryption
hides the contents of a message, it may be
possible to change an encrypted message
●Putting the private key on a smart card
●Using smart card readers with a separate
keyboard
●Using digital signatures only with trusted
applications
●Saving Of Time
●Cost Reduction
●Increased Security
●Compliance
●Digital signatures are commonly used for
software distribution, financial transactions, and
in other cases where it is important to detect
forgery and tampering.
●Hence We are conclude that to use digital
signature we can secure our information by
Private and public key.
● A digital signature is an electronic signature that
can be used to authenticate the identity of the
sender of a message or the signer of a
document,
Thanks You

More Related Content

What's hot

What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
MSA Technosoft
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
Asim Neupane
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
AboutSSL
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Rishi Pathak
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Digital signature
Digital signatureDigital signature
Digital signature
Abdullah Khosa
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
Ds over
Ds overDs over
Ds over
jolly9293
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ReachLocal Services India
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Ehtisham Ali
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 

What's hot (20)

What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Ds over
Ds overDs over
Ds over
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 

Similar to Digital signature

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
ravik09783
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
Ranga91
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
DSC Delhi
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
amshal
 
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
Dr. Mazin Mohamed alkathiri
 
D.Silpa
D.SilpaD.Silpa
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
 
Unit v
Unit vUnit v
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 

Similar to Digital signature (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Unit v
Unit vUnit v
Unit v
 
Digital signature
Digital signatureDigital signature
Digital signature
 

More from Navneet Prakash

Generic Programming
Generic ProgrammingGeneric Programming
Generic Programming
Navneet Prakash
 
Black box testing
Black box testingBlack box testing
Black box testing
Navneet Prakash
 
Persuasion skill
Persuasion skillPersuasion skill
Persuasion skill
Navneet Prakash
 
Java I/O and Object Serialization
Java I/O and Object SerializationJava I/O and Object Serialization
Java I/O and Object Serialization
Navneet Prakash
 
Service Level Agreement
Service Level AgreementService Level Agreement
Service Level Agreement
Navneet Prakash
 

More from Navneet Prakash (6)

Generic Programming
Generic ProgrammingGeneric Programming
Generic Programming
 
Black box testing
Black box testingBlack box testing
Black box testing
 
Persuasion skill
Persuasion skillPersuasion skill
Persuasion skill
 
Java I/O and Object Serialization
Java I/O and Object SerializationJava I/O and Object Serialization
Java I/O and Object Serialization
 
Service Level Agreement
Service Level AgreementService Level Agreement
Service Level Agreement
 
Sad basics (1)
Sad basics (1)Sad basics (1)
Sad basics (1)
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Digital signature

  • 1. Submitted to:- Prof.Samta Jain Submitted By:- Navneet Prakash Preeti Yadav Aakanksha Tomar
  • 2. ●“A Digital Signature is an Electronic Signature .”
  • 3. To authenticate the identity of the sender of a message The signer of a document, and To ensure that the original content of the message or document that has been signed is unchanged
  • 4. ●Only the owner can create the digital signature, hence it can be used to verify who created a message ●Generally don't sign the whole message (doubling the size of information exchanged), but just a digest or hash of the message ●A hash function takes the message, and produces a fixed size (typically 64 to 512 bits) value dependent on the message
  • 5. ●Digital Signature - a data string which associates a message with some originating entity ●When using a digital signature, the data itself is not encrypted, but a hash of the data is encrypted with a private key. A hash (also known as a digest) is a unique, fixed-length mathematical value that is determined by the content of the message
  • 6. ●In 1976,Whitfield Diffie and Martin Hellman first described the Digital Signature. ●In 1984, Shafi Goldwasser, Silvio Micali, and Ronald Rivest became the first to define the security requirements of digital signature schemes.
  • 7. Caesar Cipher The shift is linear and equidistributed 3 changes I agree lcdjuhhKey Cipher The shift is linear (cyclic) 269 k.n.gupta 62 mewam3rzjba i+3=l Space=c [+3] k+2= m (dot)=e [+6] n=w [+9]
  • 8. I agree efcc61c1c03db8d8ea8569545c073c814a0ed 755My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb 6f25I am 20 years old. 0e6d7d56c4520756f59235b6ae981cdb5f982 0a0I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b8 93e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1 ea3 ●These are digital signatures of same person on different documents ●Digital Signatures are numbers ●Same Length – 40 digits ●They are document content
  • 9. ●Message Message + signature Hash SIGN hash With Sender’s Private key Signed Message Sent thru’ Internet Message + Signatur e Calculate d Hash COMPARE Ha sh Decrypt Signature With Sender’s Public Key Sende r Receive r if OK Signatures verified
  • 10. ●A digital certificate is an electronic “document” ●or computer generated record that officially links together the subscriber’s identification with the corresponding public key. ●The certificate is digitally signed by the issuing Certification Authority (CA ) to ensure the certificate’s authenticity so that anyone in possession of the CA’s public key can verify the legitimacy of the certificate
  • 11. ●Certificate authorities (CA’s) will provide a requestor with someone’s public key contained in a certificate. Information in the certificate will identify the public key’s owner, and provide the name of the CA who validated the identity and signed the identity to public key binding. In this way it is possible to see that a certificate serves as a kind of protective “container” for the public key, protecting the integrity of its binding to an owner and authenticating both the binding and identity via the reputation (and trust) of the signing CA.
  • 12. Private Key – Used for making digital signature Public Key – Used to verify the digital signature
  • 13. ●If the sender wishes to prove to a recipient that he or she is the source oftheinformation, the sender uses his or her private key to digitally sign a message (adigital signature).
  • 14. ●The receiver of a digitally signed message uses the sender’s public key to verify the signature so that the receiver knows that the person controlling the private key corresponding to the public key sent the information, and that the received information has not been altered since it was signed.
  • 15. ●A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. ●A signing algorithm which, given a message and a private key, produces a signature. ●A signature verifying algorithm which given a message, public key and a signature, either accepts or rejects.
  • 16. ●To provide Authenticity, Integrity and Non-repudiation to electronic documents ●To use the Internet as the safe and secure medium for e-Commerce.
  • 17. ●Authentication :-Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial
  • 18. 1.Integrity :-In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message
  • 19. ●Putting the private key on a smart card ●Using smart card readers with a separate keyboard ●Using digital signatures only with trusted applications
  • 20. ●Saving Of Time ●Cost Reduction ●Increased Security ●Compliance
  • 21. ●Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery and tampering.
  • 22. ●Hence We are conclude that to use digital signature we can secure our information by Private and public key. ● A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document,