SlideShare a Scribd company logo
Digital signature
• It is the concept of public-key encryption used for message
authentication.
• It is a technique that is used to bind the person to digital data.
• The binding is digitally verified by the receiver as well as a third party.
• To understand, let’s take a real-life example – When we go to a bank
for a deposit or withdraw money by or any action, we fill the slip and
sign the paper.
• After that, the bank office verifies the signature with their data.
• If the signature match, they processed with the action; otherwise, the
action will be rejected.
• The process happens with the digital signature.
• The difference is it verifies the signature digitally.
• A digital signature is a cryptographic value that is calculated based on
the data and the secret key of the signer.
Why do we need Digital Signature?
• 1. Message Authentication
• It ensures that the message is coming from the intended sender, not
other parties.
• It allows a receiver to verify the digital signature by using the sender’s
public key; it ensures that the signature is created only by the sender
who uses the secret private key to encrypt the message.
• 2. Non-Repudiation
• As the only sender knows the secret key, i.e. signature key, he is the
only one who can create a unique signature on the data.
• If any problem arises, the receiver can show the evidence of the data
and digital signature key to the third party.
• 3. Data Integrity
• It provides data integrity to test the modification in the message.
• If somehow, the attacker gets access to the message and modifies the
data. Verification at the receiver side will fail.
• This is because the hash value of the modified message and the
algorithm’s value will not match. In this case, the receiver can reject
the message.
How does it Work?
• The user who adopts has a pair of keys – a public key and a private
key. These keys are used for the Encryption and decryption process.
• The private key is used for the encryption, i.e., signing the signature,
or we can say that it is the signature key, and the public key is used for
the decryption, i.e. verification key.
• The user, i.e. the signer, apply the hash function on the data and
creates the hash of data.
• After that, apply a signature algorithm on both the hash value and the
signature key to create the given hash’s digital signature.
• Then the signature is appended with data, and both signature and data
are sent to the verifier over the network.
• Verifier, i.e. receiver, apply verification algorithm and verification key.
This process gives value as an output.
• Verifier also used the same hash function on the data, which the signer
uses to get the hash value.
• Then he verifies the hash value and the output, which is generated by
an algorithm.
• Based on the result, the verifier validates it. If both are the same, the
digital signature is valid; otherwise, it is invalid.
Digital signatures rely on the combination of two
concepts, public-key cryptography, and hash
functions
• Alice is sending a digitally signed but not encrypted message to Bob:
• 1: Alice generates a message digest of the original plaintext message
using a secure hash function like MD5().
• 2: Alice then encrypts the message digest using her private key. The
output is the digital signature.
• 3: Alice appends the digital signature to the plaintext message.
• 4: Alice then sends the appended message to Bob
Example
• <html>
• <body>
• <?php
• $str = "Hello BIS students";
• echo md5($str);
• ?>
•
• </body>
• </html>
• 5: Bob removes the digital signature from the appended message and
decrypts it with the public key of Alice.
• 6: Bob calculates the hash of the plaintext message with SHA3-512.
• 7: Bob then compares the decrypted message digest he received from
Alice with the message digest Bob computed. If the two digests match,
he can be assured that the message he received was sent by Alice
• The digital signature process does not provide any privacy by itself.
• It only ensures that the cryptographic goals of authentication,
integrity, and nonrepudiation are met.
• If Alice wants to ensure the privacy of her message to Bob, she could
encrypt the appended message generated in step 3 with the public key
of Bob.
• Bob then would need to first decrypt the encrypted message with his
private key before continuing with step 5

More Related Content

Similar to Digital signature.pptx

Digital signature
Digital signatureDigital signature
Digital signature
swatihans
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
taherzamanrather
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
amshal
 
Unit v
Unit vUnit v
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems Engineering
JAIGANESH SEKAR
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
Kishankant Yadav
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
Kishankant Yadav
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
limsh
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
listergc
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
Santosh Gupta
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
DIKSHABORKAR8
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
Shafaan Khaliq Bhatti
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
salutiontechnology
 
Digital signature
Digital signatureDigital signature
Digital signature
9799907840kd
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
shrutiganpule74
 
Genia Solution
Genia SolutionGenia Solution

Similar to Digital signature.pptx (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
 
Unit v
Unit vUnit v
Unit v
 
Dissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems EngineeringDissemination of knowledge on Secure Systems Engineering
Dissemination of knowledge on Secure Systems Engineering
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Network security
Network securityNetwork security
Network security
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
Digital signature
Digital signatureDigital signature
Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Genia Solution
Genia SolutionGenia Solution
Genia Solution
 

More from DaveN31

Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptx
DaveN31
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
DaveN31
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptx
DaveN31
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptx
DaveN31
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
DaveN31
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptx
DaveN31
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
DaveN31
 

More from DaveN31 (7)

Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptx
 
Computer system security and control-2.pptx
Computer system security and control-2.pptxComputer system security and control-2.pptx
Computer system security and control-2.pptx
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptx
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptx
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptx
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Digital signature.pptx

  • 2. • It is the concept of public-key encryption used for message authentication. • It is a technique that is used to bind the person to digital data. • The binding is digitally verified by the receiver as well as a third party. • To understand, let’s take a real-life example – When we go to a bank for a deposit or withdraw money by or any action, we fill the slip and sign the paper.
  • 3. • After that, the bank office verifies the signature with their data. • If the signature match, they processed with the action; otherwise, the action will be rejected. • The process happens with the digital signature. • The difference is it verifies the signature digitally. • A digital signature is a cryptographic value that is calculated based on the data and the secret key of the signer.
  • 4. Why do we need Digital Signature? • 1. Message Authentication • It ensures that the message is coming from the intended sender, not other parties. • It allows a receiver to verify the digital signature by using the sender’s public key; it ensures that the signature is created only by the sender who uses the secret private key to encrypt the message.
  • 5. • 2. Non-Repudiation • As the only sender knows the secret key, i.e. signature key, he is the only one who can create a unique signature on the data. • If any problem arises, the receiver can show the evidence of the data and digital signature key to the third party.
  • 6. • 3. Data Integrity • It provides data integrity to test the modification in the message. • If somehow, the attacker gets access to the message and modifies the data. Verification at the receiver side will fail. • This is because the hash value of the modified message and the algorithm’s value will not match. In this case, the receiver can reject the message.
  • 7. How does it Work? • The user who adopts has a pair of keys – a public key and a private key. These keys are used for the Encryption and decryption process. • The private key is used for the encryption, i.e., signing the signature, or we can say that it is the signature key, and the public key is used for the decryption, i.e. verification key. • The user, i.e. the signer, apply the hash function on the data and creates the hash of data.
  • 8. • After that, apply a signature algorithm on both the hash value and the signature key to create the given hash’s digital signature. • Then the signature is appended with data, and both signature and data are sent to the verifier over the network. • Verifier, i.e. receiver, apply verification algorithm and verification key. This process gives value as an output.
  • 9. • Verifier also used the same hash function on the data, which the signer uses to get the hash value. • Then he verifies the hash value and the output, which is generated by an algorithm. • Based on the result, the verifier validates it. If both are the same, the digital signature is valid; otherwise, it is invalid.
  • 10. Digital signatures rely on the combination of two concepts, public-key cryptography, and hash functions • Alice is sending a digitally signed but not encrypted message to Bob: • 1: Alice generates a message digest of the original plaintext message using a secure hash function like MD5(). • 2: Alice then encrypts the message digest using her private key. The output is the digital signature. • 3: Alice appends the digital signature to the plaintext message. • 4: Alice then sends the appended message to Bob
  • 11. Example • <html> • <body> • <?php • $str = "Hello BIS students"; • echo md5($str); • ?> • • </body> • </html>
  • 12. • 5: Bob removes the digital signature from the appended message and decrypts it with the public key of Alice. • 6: Bob calculates the hash of the plaintext message with SHA3-512. • 7: Bob then compares the decrypted message digest he received from Alice with the message digest Bob computed. If the two digests match, he can be assured that the message he received was sent by Alice
  • 13. • The digital signature process does not provide any privacy by itself. • It only ensures that the cryptographic goals of authentication, integrity, and nonrepudiation are met. • If Alice wants to ensure the privacy of her message to Bob, she could encrypt the appended message generated in step 3 with the public key of Bob. • Bob then would need to first decrypt the encrypted message with his private key before continuing with step 5