Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Click icon to add picture

DIGITAL SIGNATURE

Prepared by : Ankit Viramgama


Roll No. : 08IT012
OBJECTIVES
-INTRO.

-WHY?

-STEPS.

-CONCEPTS.

-PROCEDURE.

-EXAMPLE.

-APPLICATIONS

-DRAWBACK
INTRODUCTION

A digital signature is nothing but an attachment


to any piece of electronic information, which
represents the content of the document and the
identity of the originator of that document
uniquely.
WHY DIGITAL SIGNATURES?
- To provide Authenticity, Integrity and Non-
repudiation to electronic documents

- To use the Internet as the safe and secure


medium for e-Commerce and e-Governance
STEPS
1 : Generation of key

2 : Signing the document

3 : Send to destination

4 : Verification of document
CONCEPTS
Public and Private key
• A 1024 bits number is a very big number much bigger than the total
number of electrons in whole world.
• Trillions of Trillions of pairs of numbers exist in this range with each
pair having following property
– A message encrypted with one element of the pair can be
decrypted ONLY by the other element of the same pair
• Two numbers of a pair are called keys, the Public Key & the Private
Key. User himself generates his own key pair on his computer
CONCEPTS
Hash Value

- Any message irrespective of its length can be compressed or


abridged uniquely into a smaller length message called the
Digest or the Hash.

- Smallest change in the message will change the Hash value


CRYPTOGRAPHY

The technique used in Digital Signature is CRYPTOGRAPHY .

Cryptography (or cryptology; from Greek kryptos + gráph,


"hidden, secret”+ "writing" ) is the practice and study of hiding
information.
Types of cryptography
There are two types of cryptography

1 : Public key cryptography

2 : Private key cryptography


PUBLIC KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 1  Encrypted Message 1

Central to the growth of e-commerce


and e-governance is the issue of 9a46894335be49f0b9cab28d7
trust in electronic environment. 55aaa9cd98571b275bbb0adb4
05e6931e856ca3e5e569edd13
5285482
 Encrypted Message 1
 Message 1
9a46894335be49f0b9cab28d755
aaa9cd98571b275bbb0adb405e6 Central to the growth of e-
931e856ca3e5e569edd1352854 commerce and e-governance is
82 the issue of trust in electronic
environment.
PUBLIC KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 1  Encrypted Message 1

Central to the growth of e-commerce


and e-governance is the issue of 9a46894335be49f0b9cab28d7
Use Private key
trust in electronic environment.
Use public key
55aaa9cd98571b275bbb0adb4
05e6931e856ca3e5e569edd13
5285482
 Encrypted Message 1
 Message 1
9a46894335be49f0b9cab28d755
aaa9cd98571b275bbb0adb405e6 Central to the growth of e-
931e856ca3e5e569edd1352854 commerce and e-governance is
82 the issue of trust in electronic
environment.
PRIVATE KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 2  Encrypted Message 2
 The Internet knows no geographical  a520eecb61a770f947ca856cd67546
boundaries. It has redefined time and 3f1c95a9a2b8d4e6a71f80830c87f57
space. Advances in computer and 15f5f59334978dd7e97da0707b48a1
telecommunication technologies have 138d77ced56feba2b467c398683c7d
led to the explosive growth of the beb86b854f120606a7ae1ed934f570
Internet. 3672adab0d7be66dccde1a763

 Encrypted Message 2  Message 2


 a520eecb61a770f947ca856cd67546  The Internet knows no geographical
3f1c95a9a2b8d4e6a71f80830c87f5 boundaries. It has redefined time and
715f5f59334978dd7e97da0707b48 space. Advances in computer and
a1138d77ced56feba2b467c398683c telecommunication technologies have led
7dbeb86b854f120606a7ae1ed934f5 to the explosive growth of the Internet.
703672adab0d7be66dccde1a763
PRIVATE KEY CRYPTOGRAPHY
ENCRYPTION DECRYPTION
 Message 2  Encrypted Message 2
 The Internet knows no geographical  a520eecb61a770f947ca856cd67546
boundaries. It has redefined time and 3f1c95a9a2b8d4e6a71f80830c87f57
Use key space.
that is Advances in computer and 15f5f59334978dd7e97da0707b48a1
telecommunication technologies have
unique Use same138d77ced56feba2b467c398683c7d
key
led to the explosive growth of the beb86b854f120606a7ae1ed934f570
Internet. 3672adab0d7be66dccde1a763

 Encrypted Message 2  Message 2


 a520eecb61a770f947ca856cd67546  The Internet knows no geographical
3f1c95a9a2b8d4e6a71f80830c87f5 boundaries. It has redefined time and
715f5f59334978dd7e97da0707b48 space. Advances in computer and
a1138d77ced56feba2b467c398683c telecommunication technologies have led
7dbeb86b854f120606a7ae1ed934f5 to the explosive growth of the Internet.
703672adab0d7be66dccde1a763
WHAT IS DIGITAL SIGNATURE?
Hash value of a message when encrypted with the private key of
a person is his digital signature on that e-Document

– Digital Signature of a person therefore varies from document


to document thus ensuring authenticity of each word of that
document.

– As the public key of the signer is known, anybody can verify


the message and the digital signature
PROCEDURE
EXAMPLE
APPLICATIONS
1.Electronic Mail.

2. Data storage.

3. Electronic funds transfer.

4. Software Distribution.

5. Telecommunication
DRAWBACKS
1.The private key must be kept in a secured manner.
2.The process of generation and verification of digital signature
requires considerable amount of time.
3.When the digital signature is not verified : receiver does not
know whether the message was corrupted or the false private key
was used.
4. Has to obtain private and public key, the receiver has to
obtain the digital signature certificate
5. Storage of all the previous keys is another overhead.
6. Does not ensure secrecy of the data.

You might also like