0% found this document useful (0 votes)
84 views18 pages

Digital Signature (08IT012)

Digital signatures provide authentication, integrity and non-repudiation for electronic documents. They work using public key cryptography where a document is hashed and encrypted with the sender's private key. The recipient can then decrypt the signature with the sender's public key and verify that the document hasn't changed by re-hashing and comparing hashes. Digital signatures have applications in e-mail, data storage, funds transfer, software distribution and telecommunications but require securing private keys, take time to generate and verify, and require storage of keys over time.

Uploaded by

uniquely_1
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views18 pages

Digital Signature (08IT012)

Digital signatures provide authentication, integrity and non-repudiation for electronic documents. They work using public key cryptography where a document is hashed and encrypted with the sender's private key. The recipient can then decrypt the signature with the sender's public key and verify that the document hasn't changed by re-hashing and comparing hashes. Digital signatures have applications in e-mail, data storage, funds transfer, software distribution and telecommunications but require securing private keys, take time to generate and verify, and require storage of keys over time.

Uploaded by

uniquely_1
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Click icon to add picture

DIGITAL SIGNATURE

Prepared by : Ankit Viramgama


Roll No. : 08IT012
OBJECTIVES
-INTRO.

-WHY?

-STEPS.

-CONCEPTS.

-PROCEDURE.

-EXAMPLE.

-APPLICATIONS

-DRAWBACK
INTRODUCTION

A digital signature is nothing but an attachment


to any piece of electronic information, which
represents the content of the document and the
identity of the originator of that document
uniquely.
WHY DIGITAL SIGNATURES?
- To provide Authenticity, Integrity and Non-
repudiation to electronic documents

- To use the Internet as the safe and secure


medium for e-Commerce and e-Governance
STEPS
1 : Generation of key

2 : Signing the document

3 : Send to destination

4 : Verification of document
CONCEPTS
Public and Private key
• A 1024 bits number is a very big number much bigger than the total
number of electrons in whole world.
• Trillions of Trillions of pairs of numbers exist in this range with each
pair having following property
– A message encrypted with one element of the pair can be
decrypted ONLY by the other element of the same pair
• Two numbers of a pair are called keys, the Public Key & the Private
Key. User himself generates his own key pair on his computer
CONCEPTS
Hash Value

- Any message irrespective of its length can be compressed or


abridged uniquely into a smaller length message called the
Digest or the Hash.

- Smallest change in the message will change the Hash value


CRYPTOGRAPHY

The technique used in Digital Signature is CRYPTOGRAPHY .

Cryptography (or cryptology; from Greek kryptos + gráph,


"hidden, secret”+ "writing" ) is the practice and study of hiding
information.
Types of cryptography
There are two types of cryptography

1 : Public key cryptography

2 : Private key cryptography


PUBLIC KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 1  Encrypted Message 1

Central to the growth of e-commerce


and e-governance is the issue of 9a46894335be49f0b9cab28d7
trust in electronic environment. 55aaa9cd98571b275bbb0adb4
05e6931e856ca3e5e569edd13
5285482
 Encrypted Message 1
 Message 1
9a46894335be49f0b9cab28d755
aaa9cd98571b275bbb0adb405e6 Central to the growth of e-
931e856ca3e5e569edd1352854 commerce and e-governance is
82 the issue of trust in electronic
environment.
PUBLIC KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 1  Encrypted Message 1

Central to the growth of e-commerce


and e-governance is the issue of 9a46894335be49f0b9cab28d7
Use Private key
trust in electronic environment.
Use public key
55aaa9cd98571b275bbb0adb4
05e6931e856ca3e5e569edd13
5285482
 Encrypted Message 1
 Message 1
9a46894335be49f0b9cab28d755
aaa9cd98571b275bbb0adb405e6 Central to the growth of e-
931e856ca3e5e569edd1352854 commerce and e-governance is
82 the issue of trust in electronic
environment.
PRIVATE KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 2  Encrypted Message 2
 The Internet knows no geographical  a520eecb61a770f947ca856cd67546
boundaries. It has redefined time and 3f1c95a9a2b8d4e6a71f80830c87f57
space. Advances in computer and 15f5f59334978dd7e97da0707b48a1
telecommunication technologies have 138d77ced56feba2b467c398683c7d
led to the explosive growth of the beb86b854f120606a7ae1ed934f570
Internet. 3672adab0d7be66dccde1a763

 Encrypted Message 2  Message 2


 a520eecb61a770f947ca856cd67546  The Internet knows no geographical
3f1c95a9a2b8d4e6a71f80830c87f5 boundaries. It has redefined time and
715f5f59334978dd7e97da0707b48 space. Advances in computer and
a1138d77ced56feba2b467c398683c telecommunication technologies have led
7dbeb86b854f120606a7ae1ed934f5 to the explosive growth of the Internet.
703672adab0d7be66dccde1a763
PRIVATE KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 2  Encrypted Message 2
 The Internet knows no geographical  a520eecb61a770f947ca856cd67546
boundaries. It has redefined time and 3f1c95a9a2b8d4e6a71f80830c87f57
Use key space.
that is Advances in computer and 15f5f59334978dd7e97da0707b48a1
telecommunication technologies have
unique Use same138d77ced56feba2b467c398683c7d
key
led to the explosive growth of the beb86b854f120606a7ae1ed934f570
Internet. 3672adab0d7be66dccde1a763

 Encrypted Message 2  Message 2


 a520eecb61a770f947ca856cd67546  The Internet knows no geographical
3f1c95a9a2b8d4e6a71f80830c87f5 boundaries. It has redefined time and
715f5f59334978dd7e97da0707b48 space. Advances in computer and
a1138d77ced56feba2b467c398683c telecommunication technologies have led
7dbeb86b854f120606a7ae1ed934f5 to the explosive growth of the Internet.
703672adab0d7be66dccde1a763
WHAT IS DIGITAL SIGNATURE?
Hash value of a message when encrypted with the private key of
a person is his digital signature on that e-Document

– Digital Signature of a person therefore varies from document


to document thus ensuring authenticity of each word of that
document.

– As the public key of the signer is known, anybody can verify


the message and the digital signature
PROCEDURE
EXAMPLE
APPLICATIONS
1.Electronic Mail.

2. Data storage.

3. Electronic funds transfer.

4. Software Distribution.

5. Telecommunication
DRAWBACKS
1.The private key must be kept in a secured manner.
2.The process of generation and verification of digital signature
requires considerable amount of time.
3.When the digital signature is not verified : receiver does not
know whether the message was corrupted or the false private key
was used.
4. Has to obtain private and public key, the receiver has to
obtain the digital signature certificate
5. Storage of all the previous keys is another overhead.
6. Does not ensure secrecy of the data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy