1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 31 Network Security
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Digital Signatures, Message Digest and Authentication Week-9.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
By, Patel Rushi N. V TH I.T. U.V.P.C.E..  What Are Signatures? Signature For Evidence: A signature authenticates writing by identifying the signer with.
Unit 3 Section 6.4: Internet Security
Digital Signature.
Digital Signatures and Forms
Pooja programmer,cse department
Presentation transcript:

1

INDEX 2

A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature writing serves the following purposes: Evidence Ceremony Approval Efficiency and Logistics To achieve the basic purposes of signatures, a signature must have following attributes: Signer authentication Document authentication Affirmative act Efficiency 3

 Digital signature means, Signature in digital form.  A digital signature is a code attached to an electronic document that uniquely identifies the sender.  Digital signature is a secure electronic signature which uses the encryption to authenticate the entity who signed the document. 4

Objectives:- Authentication- The process of verifying the identity of the owner is referred as authentication. There are two types of authentication in digital sign: 1)Signer authentication 2)Document authentication Integrity- It refers to the accuracy of the data. In other words, the objective is that message should not be modified during transmission. It will remain intact. One way of verifying the data integrity in digital signature is referred as Hash Function. 5

Non-repudiation- It means owner cannot repudiate or reject the message. In other words, he cannot say that he did not signed the document or never seen this document. Drawbacks:- WYSIWYS- WYSIWYS refers to what you see is what you sign. It means that a message cannot contain hidden information that the signer is unaware of, and that can be revealed after the signature has been applied. Association of digital signatures and trusted time stamping- Digital signature algorithms and protocols do not inherently provide certainty about the date and time at which the underlying document was signed. The signer might have included a time stamp with the signature, or the document itself might have a date mentioned on it. 6

Digital signatures are created and verified by Cryptography. Creation of Digital Signature : Private key is used for the creation of Digital Signature. There are two steps involved in creating a digital signature from a message. The first step involves creating a Hash value (also known as a message digest) from the message. This hash value is then signed, using the signer's private key. Encrypting a message digest with a private key creates a digital signature as explained in the next slide. 7

8

Verification of Digital Signature : To verify a signature, both the message and the signature are required. First, a hash value must be created from the message in the same way the signature was created. This hash value is then verified against the signature by using the public key of the signer. If the hash value and the signature match, you can be confident that the message is indeed the one the signer originally signed and that it has not been tampered with. The recipient uses the sender’s public key to decrypt the digital signature which authenticates that the message was from the trusted sender. 9

10

Cryptography is the use of codes to convert data so that only a specific recipient will be able to read it, using a key. Cryptography transforms a message into a seemingly unintelligible form. It provides a secure environment, especially over non-secure media such as the Internet. There are three classes of Cryptography: 1)Symmetric/Private key cryptography 2)Asymmetric/Public key cryptography 3)Hash function 11

Encryption is the process of translating plain text data into something that appears to be random and meaningless. Decryption is the process of converting encrypted/cipher text back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key/private key is used during both the encryption and decryption processes. To decrypt a particular piece of cipher text, the key that was used to encrypt the data must be used. 12

The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated cipher text without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of cipher text without possessing the key. It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks. 13

14

The digital certificate is a common certificate that provides a means to verify identity. A certificate is a set of data that identifies an entity. We can present a Digital Certificate electronically to prove our identity or our right to access information or services online. Digital certificates are the electronic counterparts to driver license, passports and membership cards. A digital certificate is issued by a Certification Authority (CA) And signed with the CA’s private key. A digitally signed certificate contains following: 15

 Owner’s public key  Owner’s name  Expiration date of the public key  Name of the issuer  Serial number of the digital certificate  Digital signature of the issuer Use of Digital Certificate:- Digital certificates can be used for a variety of electronic transactions including , electronic commerce, groupware and electronic funds transfers. Netscape’s popular enterprise server requires a Digital Certificate for each secure server. 16

Need of Digital Certificate:- Encryption alone is not enough as it provides no proof of the identity of the sender of the encrypted information. Digital certificate removes this problem by verifying someone’s identity Electronically. Used in conjunction with encryption, Digital Certificate provides a more complete security solution, assuring the identity of all parties involved in a transaction. Types and Status services for Digital Certificate:- Certifying authority provide issuing, revocation, and status services for following three types of digital certificates: 17

Server Certificates- It enables web server to operate in a safe mode. They simply allow website visitors to safely transfer their personal information like credit cards etc. without worrying about theft or tempering, Developer Certificates- They are used in conjunction with Microsoft Authenticode TM technology and provide customers with the information and assurance they need when downloading software from the internet. Personal Certificates- They are used by individuals when they exchange messages with other users. These certificates allows to validate a website visitor’s identity and even restrict their access to certain portions of the websites. 18

Certificates can be issued (for a fee) in the following four classes:- Class 1 certificates- Quickest and simplest to issue as they contain minimum checks on the user’s background. Only the name of the user, address, address are checked. For example : Library Card. Class 2 certificates- Check for information like real name, social security number and date of birth. It requires proof of physical address and . For example : Credit Card. 19

Class 3 certificates- Strongest types certificates. It is used for loans acquired online and other sensitive transactions. For example : Driving License. Class 4 certificates- Most secured business certificates. In addition to the class 3 requirements, the certificate authority checks on things like Users position in his/her organization. NOTE:-Considering the security in mind, Class 3 certificates and above are authorized by Ministry of Company Affairs 21 for online transactions. 20

The prospect of fully implementing digital signatures in general commerce presents both challenges and opportunities. Challenges: Implementing Digital Signature increases the following costs:-  Institutional overhead- The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions.  Subscriber and relying party costs- A digital signer will require software and has to pay Certifying Authority some price to issue a certificate. 21

Opportunities: Digital signatures, if properly implemented and utilized offer promising solutions to the problem of:-  Imposters, by minimizing the risk of dealing with imposters or person who attempt to escape responsibility by claiming to have been impersonated;  Message integrity, by minimizing the risk of undetected message tampering and forgery that a message was altered after it was sent;  Formal legal requirements, by strengthening the view that legal requirements of form are satisfied;  Open system, by retaining a high degree of information security, even for information sent over open, insecure, but inexpensive and widely used channels. 22

Thanks and Regards Sagar 23