Digital Signature.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Isiah Collins. mathematical scheme for demonstrating the authenticity of a digital message or document. (Wiki) A way to protect important documents sent.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Digital Signatures, Message Digest and Authentication Week-9.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
By, Patel Rushi N. V TH I.T. U.V.P.C.E..  What Are Signatures? Signature For Evidence: A signature authenticates writing by identifying the signer with.
TAG Presentation 18th May 2004 Paul Butler
Cryptography: an overview
Security is one of the most widely used and regarded network services
ESign Aashutosh.
eSignature Today and in the Future
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
TAG Presentation 18th May 2004 Paul Butler
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Infrastructure (PKI)
BY GAWARE S.R. DEPT.OF COMP.SCI
S/MIME T ANANDHAN.
Class 2 Digital Signature Certificate Noida
NET 311 Information Security
Digital Signatures and Forms
Pooja programmer,cse department
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Cryptography: an overview
Digital Signatures…!.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Computer Security CIS326 Dr Rachel Shipsey.
CDK: Chapter 7 TvS: Chapter 9
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Instructor Materials Chapter 5: Ensuring Integrity
Digital Signatures Network Security.
Introduction to Encryption Technology
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
National Trust Platform
Presentation transcript:

Digital Signature

INTRODUCTION The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature. Various methods have been devised to solve this problem, but the use of ‘digital signature’ is definitely the best solution amongst them. A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the originator of that document uniquely.

HISTORY Use of signatures is recorded in the Talmud (fourth century), complete with security procedures to prevent the alteration of documents after they are signed. The practice of authenticating documents by affixing handwritten signatures began to be used within the Roman Empire in the year AD 439, during the rule of Valentinian III. It is from this Roman usage of signatures that the practice obtained its significance in Western legal tradition.

What is digital signature Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document. Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature.

Why Digital Signatures To provide Authenticity, Integrity and Non- repudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and e-Governance

BASIC REQUIREMENTS…. Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message. Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message.

BASIC REQUIREMENTS Digital Signature Certificate A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber. But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was indeed sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.

PURPOSE OF DIGITAL SIGNATURE Signer authentication Message authentication Non-repudiation Integrity

HOW THE TECHNOLOGY WORKS

DIGITAL SIGNATURE ALGORITHM…. Digital Signature Generation

DIGITAL SIGNATURE ALGORITHM Secure Hash Algorithm

DIGITAL SIGNATURE ALGORITHM…. Digital Signature Verification

Challenges and Opportunities Institutional overhead: The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions. Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable.

APPLICATIONS ….. Electronic Mail Data storage Electronic funds transfer Software Distribution

DRAWBACKS The private key must be kept in a secured manner. The process of generation and verification of digital signature requires considerable amount of time. For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.

CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies.

Thanks…!!!