SlideShare a Scribd company logo
Encryption and digitalEncryption and digital
signaturesignature
Encrypting a DocumentEncrypting a Document
 To use a digital signature or encryption youTo use a digital signature or encryption you
must have a digital id also known as a digitalmust have a digital id also known as a digital
certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to
do two things. First, it can be used to do emaildo two things. First, it can be used to do email
encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only
be read by the person they are intended for.be read by the person they are intended for.
Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a
digital signature on a document to guaranteedigital signature on a document to guarantee
that it arrives in the same state it was originallythat it arrives in the same state it was originally
sent and no one has added or changed things.sent and no one has added or changed things.
 A digital id or digital certificate consists ofA digital id or digital certificate consists of
aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared
with everyone. Your private key is kept private.with everyone. Your private key is kept private.
These keys are text documents full of what appearsThese keys are text documents full of what appears
to be random numbers and letters, but with the properto be random numbers and letters, but with the proper
algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very
unique property.unique property.
 If you take a document and run it through an algorithmIf you take a document and run it through an algorithm
with your public key, you get back an encryptedwith your public key, you get back an encrypted
document or an encrypted email.document or an encrypted email.
 Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to
decrypt the document. The process is one way so itdecrypt the document. The process is one way so it
doesn’t matter if other people have the public key,doesn’t matter if other people have the public key,
they can’t read the document.they can’t read the document.
 To decrypt the document you must have the privateTo decrypt the document you must have the private
key. If you give the encrypted document to ankey. If you give the encrypted document to an
algorithm with the private key, you will get back thealgorithm with the private key, you will get back the
original document.original document.
An encrypted document does three things.An encrypted document does three things.
 It guarantees that the document was actually sentIt guarantees that the document was actually sent
by the sender.by the sender.
 It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified
in route.in route.
 It guarantees that no one else can read theIt guarantees that no one else can read the
document.document.
Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and
that it wasn’t modified.that it wasn’t modified.
Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures
 When transferring important documentsWhen transferring important documents
electronically, it is often necessary to certify inelectronically, it is often necessary to certify in
a reliable way who is actually the sendera reliable way who is actually the sender
(author) of a given document. One approach for(author) of a given document. One approach for
certifying the origin of documents and files iscertifying the origin of documents and files is
by using the so-called digital signatureby using the so-called digital signature
(electronic signature).(electronic signature).
 The digital signing of documents uses publicThe digital signing of documents uses public
key cryptography as a mathematical base.key cryptography as a mathematical base.
Creating a digital signatureCreating a digital signature
Extra unit 2

More Related Content

What's hot

Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital signature
Digital signatureDigital signature
Digital signature
Navneet Prakash
 
Digital signature
Digital signatureDigital signature
Digital signature
CHESStest{perfect Kadhu}
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Digital Signature
Digital SignatureDigital Signature
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
Asim Neupane
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Ehtisham Ali
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
Sumant Diwakar
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
MSA Technosoft
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
Asim Neupane
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 

Viewers also liked

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
pathsproject
 
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Eyal Doron
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationpathsproject
 
TAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS PandiapuramTAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS Pandiapuram
designforchangechallenge
 
IND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading LiteracyIND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading Literacy
designforchangechallenge
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
bibliotecasjuliomartins
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
designforchangechallenge
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мира
mediamera
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsadesignforchangechallenge
 
Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...
Eyal Doron
 

Viewers also liked (11)

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
 
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentation
 
TAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS PandiapuramTAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS Pandiapuram
 
IND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading LiteracyIND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading Literacy
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
 
Ana clara
Ana claraAna clara
Ana clara
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мира
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsa
 
Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...
 

Similar to Extra unit 2

D.Silpa
D.SilpaD.Silpa
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Ds over
Ds overDs over
Ds over
jolly9293
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cnDhaval Bhatia
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
amshal
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
DSC Delhi
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
PooraniBalamurugan3
 
Dsc ppt
Dsc  pptDsc  ppt
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Deevena Dayaal
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
ManuE45
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
AboutSSL
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Nicholas Davis
 

Similar to Extra unit 2 (20)

D.Silpa
D.SilpaD.Silpa
D.Silpa
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Ds over
Ds overDs over
Ds over
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Asymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptxAsymmetric Cryptography digital sig.pptx
Asymmetric Cryptography digital sig.pptx
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Digital signature
Digital signatureDigital signature
Digital signature
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 

More from Sheetal Verma (10)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Unit 4
Unit 4Unit 4
Unit 4
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Extra unit 2

  • 1. Encryption and digitalEncryption and digital signaturesignature
  • 2. Encrypting a DocumentEncrypting a Document  To use a digital signature or encryption youTo use a digital signature or encryption you must have a digital id also known as a digitalmust have a digital id also known as a digital certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to do two things. First, it can be used to do emaildo two things. First, it can be used to do email encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only be read by the person they are intended for.be read by the person they are intended for. Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a digital signature on a document to guaranteedigital signature on a document to guarantee that it arrives in the same state it was originallythat it arrives in the same state it was originally sent and no one has added or changed things.sent and no one has added or changed things.
  • 3.  A digital id or digital certificate consists ofA digital id or digital certificate consists of aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared with everyone. Your private key is kept private.with everyone. Your private key is kept private. These keys are text documents full of what appearsThese keys are text documents full of what appears to be random numbers and letters, but with the properto be random numbers and letters, but with the proper algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very unique property.unique property.  If you take a document and run it through an algorithmIf you take a document and run it through an algorithm with your public key, you get back an encryptedwith your public key, you get back an encrypted document or an encrypted email.document or an encrypted email.
  • 4.  Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to decrypt the document. The process is one way so itdecrypt the document. The process is one way so it doesn’t matter if other people have the public key,doesn’t matter if other people have the public key, they can’t read the document.they can’t read the document.  To decrypt the document you must have the privateTo decrypt the document you must have the private key. If you give the encrypted document to ankey. If you give the encrypted document to an algorithm with the private key, you will get back thealgorithm with the private key, you will get back the original document.original document.
  • 5. An encrypted document does three things.An encrypted document does three things.  It guarantees that the document was actually sentIt guarantees that the document was actually sent by the sender.by the sender.  It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified in route.in route.  It guarantees that no one else can read theIt guarantees that no one else can read the document.document. Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and that it wasn’t modified.that it wasn’t modified.
  • 6. Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures  When transferring important documentsWhen transferring important documents electronically, it is often necessary to certify inelectronically, it is often necessary to certify in a reliable way who is actually the sendera reliable way who is actually the sender (author) of a given document. One approach for(author) of a given document. One approach for certifying the origin of documents and files iscertifying the origin of documents and files is by using the so-called digital signatureby using the so-called digital signature (electronic signature).(electronic signature).  The digital signing of documents uses publicThe digital signing of documents uses public key cryptography as a mathematical base.key cryptography as a mathematical base.
  • 7. Creating a digital signatureCreating a digital signature