Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Isiah Collins. mathematical scheme for demonstrating the authenticity of a digital message or document. (Wiki) A way to protect important documents sent.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Signatures and Hash Functions. Digital Signatures.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography, Authentication and Digital Signatures
Networks Management and Security Lecture 3.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Computer and Network Security Rabie A. Ramadan Lecture 6.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
DIGITAL SIGNATURE.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Basics of Cryptography
Security is one of the most widely used and regarded network services
Public-Key Cryptography and Message Authentication
Information Security message M one-way hash fingerprint f = H(M)
Public Key Encryption Systems
S/MIME T ANANDHAN.
Information Security message M one-way hash fingerprint f = H(M)
Public Key Infrastructure
Information Security message M one-way hash fingerprint f = H(M)
Chapter 3 - Public-Key Cryptography & Authentication
Public Key Encryption Systems
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena B.Tech. IV year 0612310010

Contents 1 Definition 2 History 3 How a message be send using D.S. 4 Benefits of digital signatures 5 Drawbacks of digital signatures 6 Paper signature Vs Digital signature 7 Conclusion

Definition A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature."

What’s Digital Signing? There are many ways to sign a digital document, but we will only present the standard Digital Signing protocol. Digital signing is used to provide trust that the content has come from the claimed source and has not been altered. There are many ways to sign a digital document, but we will only present the standard Digital Signing protocol .Digital signing is used to provide trust that the content has come from the claimed source and has not been altered.

Why Digital Signatures? To provide Authenticity, Integrity and Non-repudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and e-Governance One cd rom=one tree

History In the famous paper "New Directions in Cryptography", Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed.Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm that could be used for primitive digital signatures). The first widely marketed software package to offer digital signature was Lotus Notes 1.0, released in 1989, which used the RSA algorithm.

How a message be send using Digital Signature

WORKING Digital Signature Standard (DSS)

Signed Messages OK Sent thru’ Internet Sender Receiver Message if Calculated Hash Message Sent thru’ Internet Signed Message Message + signature Message + Signature if OK Signatures verified COMPARE Hash Hash SIGN hash With Sender’s Private key Decrypt Signature With Sender’s Public Key Sender Receiver

Digital Signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA ElGamal MD5 PGP S/MIME

Public Key Infrastructure (PKI) Some Trusted Agency is required which certifies the association of an individual with the key pair. Certifying Authority (CA) This association is done by issuing a certificate to the user by the CA Public key certificate (PKC) All public key certificates are digitally signed by the CA

Digital Signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA ElGamal MD5 PGP S/MIME

Digital Certificates & Certification Authority User Certificate User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No. Certificate Database User Name & other credentials Signed by using CA’s private key Certificate Request License issued by CCA Publish User’s Public key User 1 certificate User 2 certificate . Public Public Private Web site of CA Key pair Generation

Digital Signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA DSA ElGamal SHA MD5 PGP S/MIME

RSA A public key crypto system invented by RIVEST,SHAMIR and ADLEMAN (hence R.S.A. initial) in 1977. Patented by RSA security but expired in 2000. It relies on the complexity of factoring very large prime nos.

Digital signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA DSA ElGamal SHA MD5 PGP S/MIME

Digital signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA DSA ElGamal SHA MD5 PGP S/MIME

Elgamal It is a public key cryptosystem. It is not used to encrypt message. It was invented by Taher Elgamal. It was not patented.

Digital signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA DSA ElGamal MD5 PGP S/MIME

MD5 MD5 is another hashing algorithm created by RIVEST of MIT and one of creators of the algorithm. It produces a 128 bit message digest, and while quite popular.

Digital signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA ElGamal MD5 PGP S/MIME

PGP Pretty Good Privacy(PGP) is one of the most widely used encryption for email . It was created by Phil Zimmermann in 1991 and is defined by the open PGP Working Group of the IETF standard RFC 2440. PGP is excellent software.

Digital signature Technologies PKI (Public Key Infrastructure) Digital Certificates RSA ElGamal MD5 PGP S/MIME

S/MIME S/MIME is based on PKI so it suffers the same problems and high costs. Like PGP, it also just digitally signs the message and doesn’t create legally enforceable electronics signature.

Benefits of digital signatures Authentication : Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context.

Integrity: In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions

Drawbacks of digital signatures Association of digital signatures and trusted time stamping: Digital signature algorithms and protocols do not inherently provide certainty about the date and time at which the underlying document was signed. The signer might, or might not, have included a time stamp with the signature, or the document itself might have a date mentioned on it, but a later reader cannot be certain the signer did not, for instance, backdate the date or time of the signature. Such misuse can be made impracticable by using trusted time stamping in addition to digital signatures.

Non-repudiation: In a cryptographic context, the word repudiation refers to any act of disclaiming responsibility for a message. A message's recipient may insist the sender attach a signature in order to make later repudiation more difficult, since the recipient can show the signed message to a third party (eg, a court) to reinforce a claim as to its signatories and integrity.

Paper signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free V/s

Conclusion I want to conclude that digital signature is very important for for the Encryption techniques in cryptography , that provides message authenticity and message Integrity.

Thank You