Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 13 Digital Signature
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
By, Patel Rushi N. V TH I.T. U.V.P.C.E..  What Are Signatures? Signature For Evidence: A signature authenticates writing by identifying the signer with.
TAG Presentation 18th May 2004 Paul Butler
Security Issues in Information Technology
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Security of Digital Signatures
Cryptography: an overview
Public Key Infrastructure (PKI)
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
TAG Presentation 18th May 2004 Paul Butler
SECURITY FEATURES OF ATM
e-Health Platform End 2 End encryption
Authentication.
Public-key Cryptography
12. Encryption on the Internet
S/MIME T ANANDHAN.
Digital Signature.
Public Key Infrastructure
Digital Signatures and Forms
Pooja programmer,cse department
Confidentiality and Privacy Controls
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Lecture 4 - Cryptography
Cryptography: an overview
Digital Signatures…!.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
Dashboard eHealth services: actual mockup
Public-Key, Digital Signatures, Management, Security
Instructor Materials Chapter 5: Ensuring Integrity
Digital Signatures Network Security.
Presentation transcript:

Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA

Digital Signature - a data string which associates a message with some originating entity Digital Signature Generation Algorithm – a method for producing a digital signature Digital Signature Scheme - consists of a signature generation algorithm and an associated verification algorithm

Report Encryption Algorithm Digitally Signed An individual digitally signs a document using the private key component of his certificate. Digital Signature Private key

Digital signature is a data items that vouches the origin and integrity of message.  The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient  The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit

Balance between capturing the entire content of the transaction vs. ease of data integration Data that is Machine readable but which separates user entry content from context: database, comma delimited, spreadsheet, etc Data that records content and context but which are not easily integrated into databases: word, pdf, image, html, etc

PKI is a combination of software, encryption technologies and facilities that can facilitate trusted electronic transactions. PKI Components  Key Pairs  Certificate Authority  Public Key Cryptography

Public Key Cryptography Complimentary Algorithms are used to encrypt and decrypt documents Encryption key Decryption key Unreadable Format

Public key encryption : a message encrypted with a recipient's public key cannot be decrypted by anyone except a possessor of the matching private key—presumably, this will be the owner of that key and the person associated with the public key used. This is used for confidential. Public key decryption: Public key decryption means conversion of the data from coded language means machine readable data to user readable data is called the public key decryption key.

Key-only : Adversary knows only the public key Message attacks Known-message attack : Adversary has signatures for a set of messages which are known to the adversary but not chosen by him Chosen-message attack : Adversary obtains valid signatures from a chosen list of his choice (non adaptive) Adaptive chosen-message attack : Adversary can use the signer as an oracle.

Authentication and Verification  Any changes made to the report will invalidate the signature  Provides evidence of report integrity  Provides proof of report originator’s identity - Authentication

Authentication and Verification The individual’s public key, published by the CA decrypts and verifies the digital signature. Digitally Signed Private Key Decryption Algorithm

Putting the private key on smart cards Using smart card readers with a separate keyboard

A more secure alternative is to store the private key on a smart card. Many smart cards are designed to be tamper-resistant A user must activate his smart card by entering a personal identification number or PIN code (thus providing two-factor authentication). It can be arranged that the private key never leaves the smart card, although this is not always implemented. If the smart card is stolen, the thief will still need the PIN code to generate a digital signature.

Entering a PIN code to activate the smart card commonly requires a numeric keypad. Some card readers have their own numeric keypad. This is safer than using a card reader integrated into a PC, and then entering the PIN using that computer's keyboard.

digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures.

Universities including Penn State, University of Chicago, and Stanford are publishing electronic student transcripts with digital signatures. Some industries have established common interoperabiltity standards for the use of digital signatures between members of the industry and with regulators. These include the Automotive Network Exchange for the automobile industry and the SAFE- BioPharma Association for the healthcare industry.Automotive Network ExchangeSAFE- BioPharma Association

Imposter prevention : By using digital signatures you are eliminating the possibility of committing fraud by an imposter signing the document. Since the digital signature cannot be altered, this makes forging the signature Impossible. Message integrity: By having a digital signature you are in fact proving the document to be valid. You are assuring the recipient that the document is free from forgery or falseinformation.

Using a digital signature satisfies some type of legal requirement for the document in question. A digital signature takes care of any formal legal aspect of executing the document.

The disadvantages of using digital signatures involve the primary avenue for any business: money. This is because the business may have to spend more money than usual to work with digital signatures including buying certificates from certification authorities and getting the verification software