By, Patel Rushi N. V TH I.T. U.V.P.C.E..  What Are Signatures? Signature For Evidence: A signature authenticates writing by identifying the signer with.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Web Applications Security Cryptography 1
Basics of Cryptography
Cryptographic Hash Function
TAG Presentation 18th May 2004 Paul Butler
e-Health Platform End 2 End encryption
Cryptography and Security Technologies
12. Encryption on the Internet
Cryptography.
Digital Signature.
E-Commerce Security.
IS3230 Access Security Unit 9 PKI and Encryption
Computer Security Security Concepts September 20, 2018
Pooja programmer,cse department
Confidentiality and Privacy Controls
Security through Encryption
Lecture 4 - Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Digital Signatures…!.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Outline Using cryptography in networks IPSec SSL and TLS.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

By, Patel Rushi N. V TH I.T. U.V.P.C.E.

 What Are Signatures? Signature For Evidence: A signature authenticates writing by identifying the signer with the signed document. When the signer makes a mark in a distinctive manner, the writing becomes attributable to the signer. A handwritten signature creates probative evidence in part because of the chemical properties of ink that make it adhere to paper, and because handwriting style is quite unique to the signer How It Occur ?

 Why Digital Signatures Are Needed? Now in computer age where every thing is happening lightning fast the computer base information is utilized effectively then the paper counterpart. Today it is not possible for us to reach every where in the world to sign a document. We all know computer can read digital information. In computer information stored as bits rather than as atoms of ink and paper can travel near the speed of light. But it may be duplicated without limit and with insignificant cost.

Although the basic nature of transactions has not changed. So legal and business communities must develop rules and practices, which use new technology to achieve and surpass the effects historically expected from paper forms. Digital signatures are the solution of this problem. Like the signature we use on written documents today, digital signatures are now being used to identify authors/co-signers of or electronic data.

 How Does A Digital Signature Work? A Digital Signature is created using a Digital Certificate. How do Digital Certificates work? A Digital Certificate binds a public key to an individual or organization. The binding of a public key to an individual or organization is certified by a trusted source (usually a Certification Authority or CA). Public Key CryptographyDigital Certificates are based on Public Key Cryptography, a scheme that uses public and private key pairs. The private key is known only by the owner and is used to create a digital signature.

This key must be kept private at all times by the user. The public key is widely known and is used to verify the digital signature. When the owner of public key verify a digital signature, he\she can know the identify the person who has signed the message. A public and private key is simply a pair of numbers. This association is achieved in a Digital Certificate that binds the public key to an identity. A Digital Certificate makes it possible to verify someone's claim that they have the right to use A given key, helping to prevent people from using phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates provide a more complete security solution, assuring the identity of all parties Involved in a transaction.

 What Is Cryptography?  What Is Public Key Cryptography?  What Is Key?  What Kind Of Keys Are Used In Digital Signatures ? > > > >

How Digital Signature Is Created ? To sign a document or any other item of information, the signer first delimits precisely the borders of what is to be signed. The delimited information to be signed is termed as message. Then a hash function in the signer’s software computes a hash unique result (for all practical purposes) to the message. The signer’s software then trans­forms the hash result into a digital signature using the signer’s private key. The resulting digital signature is thus unique to both the message and the private key used to create it.

(mathematical summary)

Who Can Use A Digital Certificate? Anyone who does transactions over the Internet and wants those to be secured.  For example Imagine that you are employee of a company that has a website/network with restricted access, than you will probably need a Digital Certificate to authenticate yourself on this website. If you are tired of queuing in a bank? You want to do Home Banking? Then you also need a Certificate to authenticate yourself. If you are developing ActiveX, or Java Applets? Then also you need a Certificate to digitally sign your applet and have people trust it!

Efficiency:- The processes of creating and verifying a digital signature provide a high level of assurance that the digital signature is genuinely the signer's. As with the case of modern electronic data interchange ("EDI") the creation and verification processes are capable of complete automation (sometimes referred to as "machinable"), with human interaction required on an exception basis only. Compared to paper methods such as checking specimen signature cards -- methods so tedious and labor-intensive that they are rarely actually used in practice -- digital signatures yield a high degree of assurance without adding greatly to the resources required for processing.

The processes used for digital signatures have undergone thorough technological peer review for over a decade. Digital signatures have been accepted in several national and international standards developed in cooperation with and accepted by many corporations, banks, and government agencies. The likelihood of malfunction or a security problem in a digital signature cryptosystem designed and implemented as prescribed in the industry standards is extremely remote, and is far less than the risk of undetected forgery or alteration on paper or of using other less secure electronic signature techniques. End

Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable. Persons relying on digital signatures will incur expenses for verification software and perhaps for access to certificates and certificate revocation lists (CRL) in a repository. On the plus side, the principal advantage to be gained is more reliable authentication of messages. Digital signatures, if properly implemented and utilized offer promising solutions to the problems of:

Imposters: by minimizing the risk of dealing with imposters or persons who attempt to escape responsibility by claiming to have been impersonated; Message integrity: by minimizing the risk of undetected message tampering and forgery, and of false claims that a message was altered after it was sent; Formal legal requirements: by strengthening the view that legal requirements of form, such as writing, signature, and an original document, are satisfied, since digital signatures are functionally on a par with, or superior to paper forms; and Open systems: by retaining a high degree of information security, even for information sent over open, insecure, but inexpensive and widely used channels.

 What Is Cryptography? Cryptography is the science of transforming information from readable (in plaintext) to information which is not readable. In this process, information is coded (encryption) to stop it from being read or altered by anyone but the intended recipient. It may be intercepted, but it will not be intelligible to someone without the ability to decode (decryption) the message. Encryption and decryption require a mathematical formula or "algorithm" to convert data between readable and encoded formats and a key. Back

What Is Public Key Cryptography? In a public key cryptography system, two keys are required in order for two parties to exchange information in a secure fashion: a public key and a private key. If one key is used to encrypt a message, then only the other key in the pair can be used to decrypt it. Although the keys of the public and private key pair are mathematically related, it is computationally infeasible to derive one key from the other, so the private key is protected from duplication or forgery even when someone knows the public key.

Therefore, it is safe to openly distribute your public key for everyone to use, but it is essential that your private key remains closely guarded and secret. The public key can be used to verify a message signed with the private key or encrypt messages that can only be decrypted using the private key. If someone wants to send you an encrypted message, they encrypt the message with your public key and you, being the sole possessor of the corresponding private key of the pair, are the only one who can decrypt it. Back

 What Is Key? A key is a single numeric value that is part of an algorithm for encrypting text. It is a sequence of characters used to encode and decode a file. For a symmetric key algorithm, the same key is used for both encryption and decryption. For public key algorithms, the publicly known key can only encrypt the messages, the privately held key must be used to decrypt the messages. Back

What Kind Of Keys Are Used In Digital Signatures? Digital signatures use public key cryptography. i.e Two keys are used to encrypt and decrypt a message. A Digital Signature is created using a person's "private" key. The recipient checks the signature using that person's "public" key. Back