Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Jdbc 7


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Jdbc 7

  1. 1. Digital Signatures
  2. 2. Need for digital signatures are used to digitally sign messages or objects. Ensuring message content integrity The signature is appended at the end of message before transmission. If an encrypted message is tampered with, the digital signature becomes invalid. Verifying the authenticity of the message sender A digital signature ensures that an encrypted message cannot be deciphered by unintended recipients
  3. 3. What is a Digital Signature made up of? are generated by Public Key Cryptography using public and private keys to encrypt and decrypt messages. Public key Private key
  4. 4. Comparing Digital signatures with message digest? A message digest is a fixed-length result of converting the contents of a message into a hash-like a cyclic redundancy check. A message digest is appended at the end of a message and transmitted to validate the contents of the original message. A digital signature differs from a simple message digest in: A message digest alters the content of a message into a fixed length result. The original message content cannot be recovered from digest. A message digest does not provide secrecy but a digital signature is encrypted.
  5. 5. Working of Digital Signatures Encryption: Decryption:
  6. 6. Validating data integrity No difference between data that is sent and received.
  7. 7. Drawbacks of digital signatures Non-Repudiation If sender lost its private key, the authenticity of all messages having digital signatures using that key would have been compromised. Time Stamping do not contain any record of the date and time when a particular document was signed.
  8. 8. Standards and Features of Digital Certificates A Digital Certificate is a data structure with a digital signature. The data structure also contains information like the public key,identity of the key owner and name of certification authority who guaranteesthe authenticity of the key owner. A signature is viewed as trusted when it is generated by aCertification Authority (CA) since digitally signed data cannot be alteredwithout detection. Two types of certification standards: X.509 PGP (Pretty Good Privacy)
  9. 9. Verifying the authenticity of the sender
  10. 10. Verifying the authenticity of the sender
  11. 11. Verifying the authenticity of the sender
  12. 12. Verifying the authenticity of the sender
  13. 13. Verifying the authenticity of the sender
  14. 14. Digital Keys and Key Store A digital key is a kind of a password or a passphrase used incryptography calculations. A file containing a collection of public and private keys is known as a keystore. Keystore not only stores the user’s certificate with its public and private keys but also stores other’s certificates with a public key.
  15. 15. Signing a Jar File
  16. 16. Verification of Digital Certificate The recipient receives a signed JAR file and a certificate filecontaining the public key corresponding to the private key used to sign theJAR file. Import the certificate as a Trusted Certificate Verify the JAR file Signature The imported public key certificate is used to verify
  17. 17. Verification of Digital Certificate
  18. 18. Signing and Verifying Data Using Security Tools
  19. 19. Generating public and private keys A key pair generated by using the KeyPairGenerator class. Create a Key-Pair Generator Initialize the Key-Pair generator
  20. 20. Digitally signing the data Get a Signature Object Initialize the Signature Object Supply the data to be Signed to the Signature Object Generate the Signature
  21. 21. Digitally signing the data
  22. 22. Digitally signing the data
  23. 23. Verifying the signature
  24. 24. Verifying the signature