SlideShare a Scribd company logo
Digital Signature
Mohamed Talaat
1
Agenda
• What is Digital Signature?
• How DS work?
• General Framework of DS
• Key Requirements
• Private Key Protection
• Benefits of Digital Signature
• Drawbacks of Digital Signature
• Applications
2
3
Symmetric Key Cryptography
4
Asymmetric Key Cryptography
5
What is Digital Signature?
• Digital Signature is a type of asymmetric
cryptography used to simulate the security properties
of a signature in digital, rather than written, form.
• Digital Signature is an electronic signature that can
be used to authenticate the identity of the sender of a
message or the signer of a document, and possibly to
ensure that the original content of the message or
document that has been sent is unchanged.
How it work ?
6
7
How it work?
Message
+
Signature
Message
+
Signature
HashHash
Decrypt
Signature
With Sender’s
Public Key
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
SIGN hash
With Sender’s
Private key
Message
+
signature
Message
+
signature
COMPARECOMPARE
Calculated
Hash
Calculated
Hash
MessageMessage
Sender Receiver
HashHash
SignedMessage
Sent thru’ Internet
if
OK
Signatures
verified
8
How it work ?
• The use of digital signatures usually involves two
processes, one performed by the signer and the other
by the receiver of the digital signature:
– Digital Signature Creation
• The process is performed by the sender of the
message.
– Digital Signature Verification
• The process is performed by the receiver of the
message.
9
How it work ?
• Digital Signature Creation:
– Uses a hash result derived from and unique to both the signed
message and a given private key. For the hash result to be
secure, there must be only a negligible possibility that the same
digital signature could be created by the combination of any
other message or private key.
• Digital Signature Verification:
– is the process of checking the digital signature by reference to
the original message and a given public key, thereby
determining whether the digital signature was created for that
same message using the private key that corresponds to the
referenced public key.
10
Digital Signature Framework
11
Key Requirements
• Each individual generates his own key pair, private
and public keys.
• Private key:
– Only known by the owner/sender
– Used to create the digital signature
• Public key
– It is known to everyone.
– Used to verify the digital signature.
12
Key Requirements
• Digital Certificate:
– Digital Identity that establishes your credentials when doing
business or other transactions on the Web
– Issued by a Certifying Authority (CA)
– Contains your name, serial number, expiration dates, public
key, signature of CA.
• Certificate Authority:
– Trusted Third Party.
– An organization which issues public key certificates.
– Assures the identity of the parties to whom it issues
certificates.
– Maintains online access to the public key certificates issued.
13
Private Key Protection
14
Benefits of Digital Signature
1. Authentication
– Digital signatures can be used to authenticate the source of
messages. When ownership of a digital signature secret key is
bound to a specific user, a valid signature shows that the message
was sent by that user.
– The importance of high confidence in sender authenticity is
especially obvious in a financial context.
15
Benefits of Digital Signature
2. Integrity:
– In many scenarios, the sender and receiver of a message may
have a need for confidence that the message has not been altered
during transmission.
– Although encryption hides the contents of a message, it may be
possible to change an encrypted message without understanding
it.
– If a message is digitally signed, any change in the message will
invalidate the signature.
– Furthermore, there is no efficient way to modify a message and its
signature to produce a new message with a valid signature,
because this is still considered to be computationally infeasible by
most cryptographic hash functions.
16
Paper Signature vs. Digital Signature
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature independent
of the document
Signature depends on
the contents of the
document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
17
Drawbacks of Digital Signature
• The private key must be kept in a secure manner.
• The process of generation and verification of digital
signature requires considerable amount of time.
• For using the digital signature the user has to obtain
private and public key, the receiver has to obtain the
digital signature certificate also.
18
Applications
• Electronic Mail
• Data Storage
• Electronic Funds Transfer
• Software Distribution
• Smart Cards
• Blind Signatures
• Time Stamped Signature
Thanks 
19

More Related Content

What's hot

Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
ShivangiSingh241
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana
 

What's hot (20)

Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Data encryption
Data encryptionData encryption
Data encryption
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Key management
Key managementKey management
Key management
 
Email security
Email securityEmail security
Email security
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 

Similar to Digital Signature

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
amshal
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
Kishankant Yadav
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Digital signature
Digital signatureDigital signature
Digital signature
Mohanasundaram Nattudurai
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
ravik09783
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
Ravi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 

Similar to Digital Signature (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 

More from Mohamed Talaat

Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
Mohamed Talaat
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
Mohamed Talaat
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
Mohamed Talaat
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
Mohamed Talaat
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
Mohamed Talaat
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Mohamed Talaat
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 

More from Mohamed Talaat (7)

Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 

Recently uploaded

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 

Recently uploaded (20)

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 

Digital Signature

  • 2. Agenda • What is Digital Signature? • How DS work? • General Framework of DS • Key Requirements • Private Key Protection • Benefits of Digital Signature • Drawbacks of Digital Signature • Applications 2
  • 5. 5 What is Digital Signature? • Digital Signature is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. • Digital Signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
  • 7. 7 How it work? Message + Signature Message + Signature HashHash Decrypt Signature With Sender’s Public Key Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key SIGN hash With Sender’s Private key Message + signature Message + signature COMPARECOMPARE Calculated Hash Calculated Hash MessageMessage Sender Receiver HashHash SignedMessage Sent thru’ Internet if OK Signatures verified
  • 8. 8 How it work ? • The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: – Digital Signature Creation • The process is performed by the sender of the message. – Digital Signature Verification • The process is performed by the receiver of the message.
  • 9. 9 How it work ? • Digital Signature Creation: – Uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. • Digital Signature Verification: – is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 11. 11 Key Requirements • Each individual generates his own key pair, private and public keys. • Private key: – Only known by the owner/sender – Used to create the digital signature • Public key – It is known to everyone. – Used to verify the digital signature.
  • 12. 12 Key Requirements • Digital Certificate: – Digital Identity that establishes your credentials when doing business or other transactions on the Web – Issued by a Certifying Authority (CA) – Contains your name, serial number, expiration dates, public key, signature of CA. • Certificate Authority: – Trusted Third Party. – An organization which issues public key certificates. – Assures the identity of the parties to whom it issues certificates. – Maintains online access to the public key certificates issued.
  • 14. 14 Benefits of Digital Signature 1. Authentication – Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. – The importance of high confidence in sender authenticity is especially obvious in a financial context.
  • 15. 15 Benefits of Digital Signature 2. Integrity: – In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. – Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. – If a message is digitally signed, any change in the message will invalidate the signature. – Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 16. 16 Paper Signature vs. Digital Signature Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 17. 17 Drawbacks of Digital Signature • The private key must be kept in a secure manner. • The process of generation and verification of digital signature requires considerable amount of time. • For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.
  • 18. 18 Applications • Electronic Mail • Data Storage • Electronic Funds Transfer • Software Distribution • Smart Cards • Blind Signatures • Time Stamped Signature