SlideShare a Scribd company logo
1 of 14
A Digital Signature Is A
Mathematical Scheme For
Demonstrating The
Authenticity Of A Digital
Message Or Document
Prepared by Tejashree Bangera
.
A Valid Digital Signature gives a
Recipient
Reason to believe that the Message
was created by a Known Sender,
such that the Sender cannot
Deny having sent the Message
and that the Message was not
Altered in Transit
Uses
Usesὄ Authentication- Digital signatures can
be used to authenticate the source of
messages.
ὄ Integrity- , the sender and receiver of a
message may have a need for
confidence that the message has not
been altered during transmission
ὄ Non-repudiation- By this property, an
entity that has signed some information
cannot at a later time deny having
signed it.
SACHIN
SACHIN’S PUBLIC KEY
SACHIN’S PRIVATE KEY
Anyone can get
Sachin’s Public
Key, but He
keeps his
Private Key to
himself
ROHIT VIRAT DHONI
ROHIT can encrypt a message using SACHIN's Public Key.
SACHIN's uses his Private Key to decrypt the message.
Any of SACHIN's Friends might have access to the
message ROHIT encrypted, but without Sachin’s Private
Key, the data is worthless.
"Hey Sachin,
how about a
game at the
Eden Garden. I
hear they have
free entry!"
HNFmsEm6Un
BejhhyCGKOK
JUxhiygSBCEiC
0QYIh/Hn3xgiK
BcyLK1UcYiY
lxx2lCFHDC/A
HNFmsEm6Un
BejhhyCGKOK
JUxhiygSBCEiC
0QYIh/Hn3xgiK
BcyLK1UcYiY
lxx2lCFHDC/A
"Hey Sachin,
how about a
game at the
Eden Garden.
I hear they
have free
entry!"
Sachin now passes the document on to Dhoni.
AdvantagesAuthenticates Your Identity Electronically
Provides You With A High Level Of Security For Your Online Transactions
Absolute Privacy Of The Information Exchanged Using A Digital Certificate.
Use Certificates To Encrypt Information Such That Only The Intended Recipient Can
Read It.
You Can Digitally Sign Information To Assure The Recipient That It Has Not Been
Changed In Transit
Verifies Your Identity As The Sender Of The Message`
For Secure Email And Web-Based Transactions, Or To Identify Other Participants
Of Web-Based Transactions
To Prove Ownership Of A Domain Name And Establish SSL/ TLS Encrypted Secured
Sessions Between Your Website And The User For Web Based Transactions
As A Developer, For Proving Authorship Of A Code And Retaining Integrity Of The
Distributed Software Programs
For Signing Web Forms, E-Tendering Documents, Filing Income Tax Returns,
To Access Membership-Based Websites Automatically
Without Entering A User Name And Password Etc.
News!!! News!!!
Birth and death certificates issued by BMC could
soon be signed by the health officers concerned
through digital signatures if a proposal passed on
to the administration is passed
The digital signatures will be password-protected
and health officers can approve applications
online at a convenient time, making it possible to
authorise applications faster.
ENTIRE OBJECT SIGNATURES
This Type Of Signature Includes All But A Few
Nonessential Bytes Of The Object.
CORE OBJECT SIGNATURES
This Type Of Signature Includes The Essential
Bytes Of The *CMD Object. However, The
Signature Does Not Include Those Bytes That
Are Subject To More Frequent Changes. This
Type Of Signature Allows Some Changes To Be
Made To The Command Without Invalidating
The Signature.
TYPES OF DIGITAL SIGNATURES
Misuse Of Trusted Time
Stamping- Since Automated Date Is Included,
The Reader Cannot Be Certain That The Signer Did
Not Backdate The Date And Time Of The Signature.
Non-Repudiation-Even If The User Wants To
Make Changes To A Signed Document Then Alteration Will
Make It Invalid. Hence A New Message Has To Be Drafted.
Disadvantages
IDRBT Certificate
Paper Electronic
 Digital Signatures depend on a digital object, hence they
are susceptible to fraud.
 And reliability includes more than authenticity and
integrity.
 Accuracy and trust also play an important role in the
authentication of records.
 However, due to this new technology, there is an
introduction of online file movement system, e-
commerce, online money orders, and even E-voting might
be the next step in future.
Assurance of Reliability is a never ending
process that starts on the creation or receipt ,
and must be maintained during the entire life
cycle.

More Related Content

What's hot

Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 

What's hot (19)

Non repudiation
Non repudiationNon repudiation
Non repudiation
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DSC E-Sign File Attachment
DSC E-Sign File AttachmentDSC E-Sign File Attachment
DSC E-Sign File Attachment
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Viewers also liked

Viewers also liked (6)

Introduction to the Myers-Briggs Personality Type
Introduction to the Myers-Briggs Personality TypeIntroduction to the Myers-Briggs Personality Type
Introduction to the Myers-Briggs Personality Type
 
Ability - Intellectual and Physical
Ability - Intellectual and PhysicalAbility - Intellectual and Physical
Ability - Intellectual and Physical
 
personality & value
personality & valuepersonality & value
personality & value
 
Logic
LogicLogic
Logic
 
Logic introduction
Logic   introductionLogic   introduction
Logic introduction
 
PERSONALITY DEVELOPMENT
PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT
PERSONALITY DEVELOPMENT
 

Similar to Digital Signatures- Learning The Process With Fun

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfXtratrust Digisign Pvt ltd
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely SreeramulaSatya
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxManuE45
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptxAkash588342
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 

Similar to Digital Signatures- Learning The Process With Fun (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
Digital Certificate Email usage
Digital Certificate Email usageDigital Certificate Email usage
Digital Certificate Email usage
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Digital Signatures- Learning The Process With Fun

  • 1. A Digital Signature Is A Mathematical Scheme For Demonstrating The Authenticity Of A Digital Message Or Document Prepared by Tejashree Bangera
  • 2. . A Valid Digital Signature gives a Recipient Reason to believe that the Message was created by a Known Sender, such that the Sender cannot Deny having sent the Message and that the Message was not Altered in Transit
  • 3. Uses Usesὄ Authentication- Digital signatures can be used to authenticate the source of messages. ὄ Integrity- , the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission ὄ Non-repudiation- By this property, an entity that has signed some information cannot at a later time deny having signed it.
  • 4. SACHIN SACHIN’S PUBLIC KEY SACHIN’S PRIVATE KEY Anyone can get Sachin’s Public Key, but He keeps his Private Key to himself ROHIT VIRAT DHONI
  • 5. ROHIT can encrypt a message using SACHIN's Public Key. SACHIN's uses his Private Key to decrypt the message. Any of SACHIN's Friends might have access to the message ROHIT encrypted, but without Sachin’s Private Key, the data is worthless. "Hey Sachin, how about a game at the Eden Garden. I hear they have free entry!" HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A "Hey Sachin, how about a game at the Eden Garden. I hear they have free entry!"
  • 6.
  • 7. Sachin now passes the document on to Dhoni.
  • 8. AdvantagesAuthenticates Your Identity Electronically Provides You With A High Level Of Security For Your Online Transactions Absolute Privacy Of The Information Exchanged Using A Digital Certificate. Use Certificates To Encrypt Information Such That Only The Intended Recipient Can Read It. You Can Digitally Sign Information To Assure The Recipient That It Has Not Been Changed In Transit Verifies Your Identity As The Sender Of The Message` For Secure Email And Web-Based Transactions, Or To Identify Other Participants Of Web-Based Transactions To Prove Ownership Of A Domain Name And Establish SSL/ TLS Encrypted Secured Sessions Between Your Website And The User For Web Based Transactions As A Developer, For Proving Authorship Of A Code And Retaining Integrity Of The Distributed Software Programs For Signing Web Forms, E-Tendering Documents, Filing Income Tax Returns, To Access Membership-Based Websites Automatically Without Entering A User Name And Password Etc.
  • 9. News!!! News!!! Birth and death certificates issued by BMC could soon be signed by the health officers concerned through digital signatures if a proposal passed on to the administration is passed The digital signatures will be password-protected and health officers can approve applications online at a convenient time, making it possible to authorise applications faster.
  • 10.
  • 11. ENTIRE OBJECT SIGNATURES This Type Of Signature Includes All But A Few Nonessential Bytes Of The Object. CORE OBJECT SIGNATURES This Type Of Signature Includes The Essential Bytes Of The *CMD Object. However, The Signature Does Not Include Those Bytes That Are Subject To More Frequent Changes. This Type Of Signature Allows Some Changes To Be Made To The Command Without Invalidating The Signature. TYPES OF DIGITAL SIGNATURES
  • 12. Misuse Of Trusted Time Stamping- Since Automated Date Is Included, The Reader Cannot Be Certain That The Signer Did Not Backdate The Date And Time Of The Signature. Non-Repudiation-Even If The User Wants To Make Changes To A Signed Document Then Alteration Will Make It Invalid. Hence A New Message Has To Be Drafted. Disadvantages
  • 14.  Digital Signatures depend on a digital object, hence they are susceptible to fraud.  And reliability includes more than authenticity and integrity.  Accuracy and trust also play an important role in the authentication of records.  However, due to this new technology, there is an introduction of online file movement system, e- commerce, online money orders, and even E-voting might be the next step in future. Assurance of Reliability is a never ending process that starts on the creation or receipt , and must be maintained during the entire life cycle.