SlideShare a Scribd company logo
1 of 8
E- Business
Digital Signature
Varna Free University
Prof. Teodora Bakardjieva
β€’is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than written,
form. Digital signature schemes normally give two algorithms, one
for signing which involves the user's secret or private key, and
one for verifying signatures which involves the user's public key.
The output of the signature process is called the "digital signature.β€œ
β€’is an electronic signature that can be used to authenticate the
identity of the sender of a message or the signer of a document,
and possibly to ensure that the original content of the message or
document that has been sent is unchanged. Digital signatures are
easily transportable, cannot be imitated by someone else, and can
be automatically time-stamped. The ability to ensure that the
original signed message arrived means that the sender cannot
easily repudiate it later.
What is a digital signature?
How it works
β€’ The use of digital signatures usually involves two
processes, one performed by the signer and the other by
the receiver of the digital signature:
β€’ Digital signature creation uses a hash result derived
from and unique to both the signed message and a given
private key. For the hash result to be secure, there must
be only a negligible possibility that the same digital
signature could be created by the combination of any
other message or private key.
β€’ Digital signature verification is the process of checking
the digital signature by reference to the original message
and a given public key, thereby determining whether the
digital signature was created for that same message
using the private key that corresponds to the referenced
public key.
Example
β€’ Assume you were going to send the draft of a contract to your
lawyer in another town. You want to give your lawyer the assurance
that it was unchanged from what you sent and that it is really from
you.
1. You copy-and-paste the contract (it's a short one!) into an e-mail
note.
2. Using special software, you obtain a message hash (mathematical
summary) of the contract.
3. You then use a private key that you have previously obtained from a
public-private key authority to encrypt the hash.
4. The encrypted hash becomes your digital signature of the message.
(Note that it will be different each time you send a message.)
β€’ At the other end, your lawyer receives the message.
1. To make sure it's intact and from you, your lawyer makes a hash of
the received message.
2. Your lawyer then uses your public key to decrypt the message hash
or summary.
3. If the hashes match, the received message is valid.
Benefits of digital signatures
These are common reasons for applying a digital signature to communications:
β€’ Authentication
Although messages may often include information about the entity sending
a message, that information may not be accurate. Digital signatures can be
used to authenticate the source of messages. When ownership of a digital
signature secret key is bound to a specific user, a valid signature shows that
the message was sent by that user. The importance of high confidence in
sender authenticity is especially obvious in a financial context. For example,
suppose a bank's branch office sends instructions to the central office
requesting a change in the balance of an account. If the central office is not
convinced that such a message is truly sent from an authorized source,
acting on such a request could be a grave mistake.
β€’ Integrity
In many scenarios, the sender and receiver of a message may have a need
for confidence that the message has not been altered during transmission.
Although encryption hides the contents of a message, it may be possible to
change an encrypted message without understanding it. (Some encryption
algorithms, known as nonmalleable ones, prevent this, but others do not.)
However, if a message is digitally signed, any change in the message will
invalidate the signature. Furthermore, there is no efficient way to modify a
message and its signature to produce a new message with a valid
signature, because this is still considered to be computationally infeasible by
most cryptographic hash functions.
Drawbacks of digital signatures
Despite their usefulness, digital signatures do not alone solve all
the problems we might wish them to.
Non-repudiation
In a cryptographic context, the word repudiation refers to the act
of disclaiming responsibility for a message. A message's
recipient may insist the sender attach a signature in order to
make later repudiation more difficult, since the recipient can
show the signed message to a third party (eg, a court) to
reinforce a claim as to its signatories and integrity. However,
loss of control over a user's private key will mean that all digital
signatures using that key, and so ostensibly 'from' that user, are
suspect. Nonetheless, a user cannot repudiate a signed
message without repudiating their signature key.
Main Questions?
1. In the digital signature who use the private key and
who use the public key?
Private key: sender
Public key: receiver
2. What are the benefits of digital signatures?
Authentication and Integrity

More Related Content

What's hot

Digital signature
Digital signatureDigital signature
Digital signatureAbdullah Khosa
Β 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?MSA Technosoft
Β 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
Β 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overviewRishi Pathak
Β 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
Β 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
Β 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
Β 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
Β 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
Β 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
Β 
Digital Signature
Digital SignatureDigital Signature
Digital SignatureMohamed Talaat
Β 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
Β 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
Β 

What's hot (19)

Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
Β 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Β 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Β 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Β 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Β 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Β 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
Β 
D.Silpa
D.SilpaD.Silpa
D.Silpa
Β 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Β 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Β 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Β 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
Β 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Β 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
Β 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Β 

Viewers also liked

Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Bayar shahab
Β 
Interference and system capacity
Interference and system capacityInterference and system capacity
Interference and system capacityAJAL A J
Β 
Cellular network
Cellular networkCellular network
Cellular networkshreb
Β 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
Β 
Shakr - Container CI/CD with Google Cloud Platform
Shakr - Container CI/CD with Google Cloud PlatformShakr - Container CI/CD with Google Cloud Platform
Shakr - Container CI/CD with Google Cloud PlatformMinku Lee
Β 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
Β 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb
Β 
Artificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemArtificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemREHMAT ULLAH
Β 
Speech recognition
Speech recognitionSpeech recognition
Speech recognitionCharu Joshi
Β 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchainPriyab Satoshi
Β 
Securing Application Deployments in CI/CD Environments (Updated slides: http:...
Securing Application Deployments in CI/CD Environments (Updated slides: http:...Securing Application Deployments in CI/CD Environments (Updated slides: http:...
Securing Application Deployments in CI/CD Environments (Updated slides: http:...Binu Ramakrishnan
Β 
10 Color Banner Design Inspiration
10 Color Banner Design Inspiration10 Color Banner Design Inspiration
10 Color Banner Design InspirationBannersnack
Β 
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]Slides | Presentation Design Agency
Β 
What Analytics Won't Tell You: Get Essential Insights for Content and Design
What Analytics Won't Tell You: Get Essential Insights for Content and DesignWhat Analytics Won't Tell You: Get Essential Insights for Content and Design
What Analytics Won't Tell You: Get Essential Insights for Content and DesignMelissa Eggleston
Β 
Design Thinking: Finding Problems Worth Solving In Health
Design Thinking: Finding Problems Worth Solving In HealthDesign Thinking: Finding Problems Worth Solving In Health
Design Thinking: Finding Problems Worth Solving In HealthAdam Connor
Β 
How Agile Dev Teams work
How Agile Dev Teams workHow Agile Dev Teams work
How Agile Dev Teams workXPeppers
Β 
Getting Information through HTML Forms
Getting Information through HTML FormsGetting Information through HTML Forms
Getting Information through HTML FormsMike Crabb
Β 
17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to View17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to ViewJim MacLeod
Β 

Viewers also liked (20)

e-Commerce
e-Commercee-Commerce
e-Commerce
Β 
Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks
Β 
Interference and system capacity
Interference and system capacityInterference and system capacity
Interference and system capacity
Β 
Cellular network
Cellular networkCellular network
Cellular network
Β 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
Β 
Shakr - Container CI/CD with Google Cloud Platform
Shakr - Container CI/CD with Google Cloud PlatformShakr - Container CI/CD with Google Cloud Platform
Shakr - Container CI/CD with Google Cloud Platform
Β 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
Β 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research Report
Β 
Artificial intelligence Speech recognition system
Artificial intelligence Speech recognition systemArtificial intelligence Speech recognition system
Artificial intelligence Speech recognition system
Β 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
Β 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
Β 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
Β 
Securing Application Deployments in CI/CD Environments (Updated slides: http:...
Securing Application Deployments in CI/CD Environments (Updated slides: http:...Securing Application Deployments in CI/CD Environments (Updated slides: http:...
Securing Application Deployments in CI/CD Environments (Updated slides: http:...
Β 
10 Color Banner Design Inspiration
10 Color Banner Design Inspiration10 Color Banner Design Inspiration
10 Color Banner Design Inspiration
Β 
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
How to Create a Twitter Cover Photo in PowerPoint [Tutorial]
Β 
What Analytics Won't Tell You: Get Essential Insights for Content and Design
What Analytics Won't Tell You: Get Essential Insights for Content and DesignWhat Analytics Won't Tell You: Get Essential Insights for Content and Design
What Analytics Won't Tell You: Get Essential Insights for Content and Design
Β 
Design Thinking: Finding Problems Worth Solving In Health
Design Thinking: Finding Problems Worth Solving In HealthDesign Thinking: Finding Problems Worth Solving In Health
Design Thinking: Finding Problems Worth Solving In Health
Β 
How Agile Dev Teams work
How Agile Dev Teams workHow Agile Dev Teams work
How Agile Dev Teams work
Β 
Getting Information through HTML Forms
Getting Information through HTML FormsGetting Information through HTML Forms
Getting Information through HTML Forms
Β 
17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to View17 Ways to Design a Presentation People Want to View
17 Ways to Design a Presentation People Want to View
Β 

Similar to E business--dig sig

Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
Β 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptxMIRZATABISHHASAN1
Β 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-CommerceNaveen Jakhar, I.T.S
Β 
Digital signature
Digital signatureDigital signature
Digital signaturegajerachetan
Β 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
Β 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
Β 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
Β 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
Β 
Digital signature
Digital signatureDigital signature
Digital signaturedhivyakesavan3
Β 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
Β 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxManuE45
Β 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptxDaveN31
Β 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
Β 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
Β 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .sSindhu Nathan
Β 
Cryptography
CryptographyCryptography
CryptographyTanviGogri
Β 

Similar to E business--dig sig (20)

Digital signature
Digital  signatureDigital  signature
Digital signature
Β 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
Β 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
Β 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
Digital signature
Digital signatureDigital signature
Digital signature
Β 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Β 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
Β 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
Β 
Digital signturue
Digital signturueDigital signturue
Digital signturue
Β 
Unit v
Unit vUnit v
Unit v
Β 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
Β 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Β 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Β 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
Β 
Cryptography
CryptographyCryptography
Cryptography
Β 

Recently uploaded

VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Roomishabajaj13
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Β 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
Β 
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts servicevipmodelshub1
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Β 
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Callshivangimorya083
Β 
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”soniya singh
Β 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
Β 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
Β 
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Β 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
Β 
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts servicesonalikaur4
Β 
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”soniya singh
Β 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
Β 
VIP Call Girls Kolkata Ananya 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🀌  8250192130 πŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
Β 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake πŸ‘‰ 8250192130 Available With Room
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Β 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
Β 
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Β 
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 β˜Žβœ”πŸ‘Œβœ” Whatsapp Hard And Sexy Vip Call
Β 
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Saket Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Β 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
Β 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
Β 
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum πŸ‘‰ 8250192130 Available With Room
Β 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Β 
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Β 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Β 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Β 
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Model Towh Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Β 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
Β 
VIP Call Girls Kolkata Ananya 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🀌  8250192130 πŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❀️ 7710465962 Independent Call Girls In C...
Β 

E business--dig sig

  • 1. E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva
  • 2. β€’is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature.β€œ β€’is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. What is a digital signature?
  • 3. How it works β€’ The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: β€’ Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. β€’ Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 4. Example β€’ Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you. 1. You copy-and-paste the contract (it's a short one!) into an e-mail note. 2. Using special software, you obtain a message hash (mathematical summary) of the contract. 3. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash. 4. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.) β€’ At the other end, your lawyer receives the message. 1. To make sure it's intact and from you, your lawyer makes a hash of the received message. 2. Your lawyer then uses your public key to decrypt the message hash or summary. 3. If the hashes match, the received message is valid.
  • 5.
  • 6. Benefits of digital signatures These are common reasons for applying a digital signature to communications: β€’ Authentication Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake. β€’ Integrity In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 7. Drawbacks of digital signatures Despite their usefulness, digital signatures do not alone solve all the problems we might wish them to. Non-repudiation In a cryptographic context, the word repudiation refers to the act of disclaiming responsibility for a message. A message's recipient may insist the sender attach a signature in order to make later repudiation more difficult, since the recipient can show the signed message to a third party (eg, a court) to reinforce a claim as to its signatories and integrity. However, loss of control over a user's private key will mean that all digital signatures using that key, and so ostensibly 'from' that user, are suspect. Nonetheless, a user cannot repudiate a signed message without repudiating their signature key.
  • 8. Main Questions? 1. In the digital signature who use the private key and who use the public key? Private key: sender Public key: receiver 2. What are the benefits of digital signatures? Authentication and Integrity