Digital Signature By: Jermel Lee.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Isiah Collins. mathematical scheme for demonstrating the authenticity of a digital message or document. (Wiki) A way to protect important documents sent.
New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
DIGITAL SIGNATURE.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
& UETAESIGN COMPLIANCE. CHANGING LANDSCAPE As contract management transitions into a paperless world, documents must remain compliant with government.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
7 FAQ’s About Signing Documents Online
How the ESign Act Makes Esignatures Work
TAG Presentation 18th May 2004 Paul Butler
TOPIC: HTTPS (Security protocol)
Threat Modeling for Cloud Computing
INFORMATION SYSTEMS SECURITY AND CONTROL.
2a 1 2b Zero-paper Branch Remote Digital Signature (RDS)
Basics of Cryptography
eSignature Today and in the Future
Symmetric and Asymmetric Encryption
The Journey to a Digital Office
Privacy & Security.
Cryptographic Hash Function
TAG Presentation 18th May 2004 Paul Butler
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Authentication.
The Changing Face of Digital Identity
FACE RECOGNITION TECHNOLOGY
Uses Uses of cryptography Lab today on RSA
Cryptography and Security Technologies
Public Key Encryption and the RSA Algorithm
Digital Signature.
Digital Signatures Last Updated: Oct 14, 2017.
Class 2 Digital Signature Certificate Noida
NET 311 Information Security
Two Way Authentication
Applying Robust Solutions
Computer-Based Processing: Developing an Audit Assessment Approach
Pooja programmer,cse department
Legislation, Regulation, Guidelines
Security in Network Communications
INFORMATION SYSTEMS SECURITY and CONTROL
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Digital Signatures…!.
ELECTRONIC PAYMENT SYSTEM.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
NET 311 Information Security
Lecture 6: Digital Signature
Computer Security CIS326 Dr Rachel Shipsey.
Public-Key, Digital Signatures, Management, Security
Chapter -8 Digital Signatures
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
One-way Hash Function Network Security.
Digital Signatures Network Security.
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Digital Signature By: Jermel Lee

Digital Signature Fastest way to continue movement Secure Future in technology Business

Ronold Rivest & Adi Shamir Were the first two to make digital signature become more of a dominate source of technology rather than cards and copy write.

Software Commonly used for software distribution on financial transaction and in other cases where its important to detect forgery The way technology is changing now things are used by technology and becoming econ friendly

Digital Signature Used frequently Nick-name “E sign” A key generation program that selects a private key at random from a set of possible private keys. Given a message a signature, either accepts or rejects the message's claim to authenticity.

Security Digital signature is more secure rather than paper signature due to the fact its possible for you to lose a slip of paper and easy to duplicate on a paper rather then digital signature. No ink on paper Parties meeting in person

Digital Signature Doubt of integrity of digital signature Businesses Cons Pros Doubt of integrity of digital signature Costly more then paper and ink Cost of equipment Businesses Less costly Less risk of fraud Digital signature might be what solution we are looking for in the future with the way technology is going

Unique as the person making the signature Why Digital Signature? Saves time No unnecessary communication Secure saves from identity theft and people stealing signature from copy write Unique as the person making the signature

Conclusion A signature on a document is an indication that the person adopts the intentions recorded in the document. Signatures as far back as the mid-19th century and faxed signatures since the 1980s  The technology or process can be used to identify the person using the technology or process

Bibliography http://office.microsoft.com/en-us/outlook-help/electronic-signatures-HA101872117.aspx https://www.google.com/search?hl=en&biw=1280&bih=709&q=adi%20shamir&gs_sm=e&gs_upl=557120l563769l0l564047l10l10l0l0l0l0l261l1698l2.6.2l10l0&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=2FzdTqzDDOPx0gHGvpCADg http://www.arx.com/default.asp?rr=2&catid={E19ED3E5-E326-439D-95FD-7E569D2301AE}&r1=1&loginId=&cartId= http://people.csail.mit.edu/rivest/bio.html https://www.owasp.org/index.php/Digital_Signature_Implementation_in_Java http://www.ftc.gov/os/2001/06/esign7.htm