SlideShare una empresa de Scribd logo
1 de 31
PRESENTED BY:
                ANKITA DAVE
                              1
SR.NO.                     TOPIC                        SLIDE NO.
  1.     WHAT IS DIGITAL SIGNATURES?                        4
  2.     WHY DIGITAL SIGNATURES?                            5
  3.     PAPER SIGNATURES VS DIGITAL SIGNATURES             6
  4.     PRIVATE KEY & PUBLIC KEY                           7
  5.     PROTECTION OF PRIVATE KEY                          8
  6.     WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)?       9
  7.     CERTIFICATION AUTHORITY (CA)                      10
  8.     HOW DOES DIGITAL SIGNATURES WORKS?                11
  9.     PROCEDURE TO OBTAIN DSC                           12

                                                                    2
SR.NO.                      TOPIC                        SLIDE NO.
  10.    STEP 1: DOWNLOADING ROOT CERTIFICATE               13
  11.    STEP 2: SELECTING A CERTIFYING AUTHORITY           18
  12.    STEP 3: VISIT THE WEBSITE OF THE CA                19
  13.    CLASS- 1 CERTIFICATES                              20
  14.    CLASS- 2 CERTIFICATES                              21
  15.    CLASS- 3 CERTIFICATES                              22
  16.    STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED      23
  17.    STEP 5: SUBMIT AN ONLINE REQUEST                   24
  18.    CONCLUSION                                         29
  19.    SOURCES OF INFORMATION                             30
                                                                     3
   As per Information Technology
    Act 2000, digital signature
    means authentication of any
    electronic record by means of
    an electronic.
   Simply, signature in digital form
                OR
    Mark to authenticate a
    document.
                                        4
   Authentification.
   Integrity.
   Low cost.
   Eliminates the use of paper.
   Faster procedures.
   Completely secure.




                                   5
PARAMETER           PAPER             DIGITAL

Authenticity      May be forged    Can not be copied
Integrity         Signature        Signature depends
                  independent of   on the contents of
                  the document     the document
Non-repudiation   a. Handwriting   a. Any computer
                     expert needed    user
                  b. Error prone   b. Error free
                                                        6
Each individual generates his own key pair.

  PRIVATE KEY              PUBLIC KEY


     Known only to              Known to
        owner                   everyone

    Used for making           Used to verify
    digital signature        digital signature

                                                 7
The private key generated is to be protected &
 kept in secret because
   Can be misused by anyone who is having
    access to your computer system.
   Is lost if computer system is formatted or
    internet explorer is changed.
 The key is secured using



                                                  8
Is an electronic means of establishing records
 when doing transactions on the Internet.
Are easily transportable and cannot be imitated.
Contains details like owner’s name & public
 key, expiration date of public, serial number &
 name of the issuer (the Certification Authority) &
 his digital signature.
It is issued so that Recipient can verify that the
 certificate is authentic.
                                                 9
SR. NO. NAMES OF CA             WEBSITES
  1.   NIC              nicca.nic.in
  2.   GNFC             www.ncodesolutions.com
  3.   SAFESCRYPT       www.safescrypt.com
  4.   TCS              www.tcs-ca.tcs.co.in
  5.   MTNL TRUSTLINE   www.mtnltrustline.com
  6.   IDRBT            www.idrbtca.org.in
  7.   E-MUDHRA         www.e-Mudhra.com




                                                 10
11
DOWNLOADING ROOT CERTIFICATE

    SELECTING A CERTIFYING AUTHORITY

VISIT THE WEBSITE OF CERTIFYING AUTHORITY

  SELECT THE TYPE OF CERTIFICATE NEEDED

       SUBMIT AN ONLINE REQUEST


                                            12
Visit the website of the Controller of Certifying
       Authorities (CCA) at www.cca.gov.in.




                                                    13
14
15
16
17
 Visit the website of the CCA at www.cca.gov.in
 to obtain a list of licensed Certifying Authorities
 in India.
 Based on information and study of the relevant
 websites, select a Certifying Authority.
  Example: TCS official website is
 www.tcs-ca.tcs.co.in.



                                                   18
A visit to the select CA website provides
  following three types of digital signature
  certificates:
CLASSES OF DSC:
 Class-1 certificates
 Class-2 certificates
 Class-3 certificates.

                                               19
 These Certificates are personal e-mail
 Certificates that allows you to secure your email
 messages. These certificates can be used to:
 1. Digitally sign email.
 2. Encrypt email.
 3. Authenticate to Web Servers.
 These certificates, however, do not facilitate
 strong authentication of the identity of the
 subscriber and hence, cannot be relied upon
 where proof of identity is required (commercial
 use).                                           20
   These Certificates are issued as Managed Digital
    Certificates to employees/ partners/ affiliates/
    customers of business and government
    organizations that are ready to assume the
    responsibility of verifying the accuracy of the
    information submitted by their employees/
    partners/ affiliates/ customers.
   These certificates issued under the TCS-CA Trust
    Network are legally valid under the Indian IT Act
    2000.
                                                    21
   These Certificates are issued to individuals,
    companies and government organizations.
   They can be used both for personal and
    commercial purposes.
   They are typically used for electronic commerce
    applications where security is a major concern.
   These Certificates issued by the TCS-CA are
    legally valid under Indian IT Act 2000.


                                                  22
We need a legally valid digital signature
certificate for an individual. The relevant
certificate is a class-3 certificate.




                                              23
The next step is to create a user account on the
TCS CA website, complete an online enrollment
form and generate a cryptographic key pair on
our computer.




                                               24
25
26
27
28
Hence, we can conclude that digital signatures:
Minimizes the risk of dealing with imposters.
Minimizes the risk of undetected message
 tampering and forgery.
Retains a high degree of information security.




                                                  29
asclonline.com/images/d/d4/Simple_Guide_to_
 Digital_Signatures.pdf
www.youdzone.com/signature.html
en.wikipedia.org/wiki/Digital_signatures
www.cca.gov.in
esolutions.net.in/digitalsignatures.html
nsdl.co.in/business/cirRec_18Mar08.doc



                                           30
Digital signature 3

Más contenido relacionado

La actualidad más candente

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Hai Nguyen
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
Sachi Sawamura
 

La actualidad más candente (20)

Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 Presentation
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Digital signature
Digital signatureDigital signature
Digital signature
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
NetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2aNetIQ Customer Success Story - a2a
NetIQ Customer Success Story - a2a
 

Similar a Digital signature 3

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 

Similar a Digital signature 3 (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Advance itt
Advance ittAdvance itt
Advance itt
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSC
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Digital signature 3

  • 1. PRESENTED BY: ANKITA DAVE 1
  • 2. SR.NO. TOPIC SLIDE NO. 1. WHAT IS DIGITAL SIGNATURES? 4 2. WHY DIGITAL SIGNATURES? 5 3. PAPER SIGNATURES VS DIGITAL SIGNATURES 6 4. PRIVATE KEY & PUBLIC KEY 7 5. PROTECTION OF PRIVATE KEY 8 6. WHAT IS DIGITAL SIGNATURE CERTIFICATE (DSC)? 9 7. CERTIFICATION AUTHORITY (CA) 10 8. HOW DOES DIGITAL SIGNATURES WORKS? 11 9. PROCEDURE TO OBTAIN DSC 12 2
  • 3. SR.NO. TOPIC SLIDE NO. 10. STEP 1: DOWNLOADING ROOT CERTIFICATE 13 11. STEP 2: SELECTING A CERTIFYING AUTHORITY 18 12. STEP 3: VISIT THE WEBSITE OF THE CA 19 13. CLASS- 1 CERTIFICATES 20 14. CLASS- 2 CERTIFICATES 21 15. CLASS- 3 CERTIFICATES 22 16. STEP 4: SELECT THE TYPE OF CERTIFICATE NEEDED 23 17. STEP 5: SUBMIT AN ONLINE REQUEST 24 18. CONCLUSION 29 19. SOURCES OF INFORMATION 30 3
  • 4. As per Information Technology Act 2000, digital signature means authentication of any electronic record by means of an electronic.  Simply, signature in digital form OR Mark to authenticate a document. 4
  • 5. Authentification.  Integrity.  Low cost.  Eliminates the use of paper.  Faster procedures.  Completely secure. 5
  • 6. PARAMETER PAPER DIGITAL Authenticity May be forged Can not be copied Integrity Signature Signature depends independent of on the contents of the document the document Non-repudiation a. Handwriting a. Any computer expert needed user b. Error prone b. Error free 6
  • 7. Each individual generates his own key pair. PRIVATE KEY PUBLIC KEY Known only to Known to owner everyone Used for making Used to verify digital signature digital signature 7
  • 8. The private key generated is to be protected & kept in secret because  Can be misused by anyone who is having access to your computer system.  Is lost if computer system is formatted or internet explorer is changed.  The key is secured using 8
  • 9. Is an electronic means of establishing records when doing transactions on the Internet. Are easily transportable and cannot be imitated. Contains details like owner’s name & public key, expiration date of public, serial number & name of the issuer (the Certification Authority) & his digital signature. It is issued so that Recipient can verify that the certificate is authentic. 9
  • 10. SR. NO. NAMES OF CA WEBSITES 1. NIC nicca.nic.in 2. GNFC www.ncodesolutions.com 3. SAFESCRYPT www.safescrypt.com 4. TCS www.tcs-ca.tcs.co.in 5. MTNL TRUSTLINE www.mtnltrustline.com 6. IDRBT www.idrbtca.org.in 7. E-MUDHRA www.e-Mudhra.com 10
  • 11. 11
  • 12. DOWNLOADING ROOT CERTIFICATE SELECTING A CERTIFYING AUTHORITY VISIT THE WEBSITE OF CERTIFYING AUTHORITY SELECT THE TYPE OF CERTIFICATE NEEDED SUBMIT AN ONLINE REQUEST 12
  • 13. Visit the website of the Controller of Certifying Authorities (CCA) at www.cca.gov.in. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.  Visit the website of the CCA at www.cca.gov.in to obtain a list of licensed Certifying Authorities in India.  Based on information and study of the relevant websites, select a Certifying Authority. Example: TCS official website is www.tcs-ca.tcs.co.in. 18
  • 19. A visit to the select CA website provides following three types of digital signature certificates: CLASSES OF DSC:  Class-1 certificates  Class-2 certificates  Class-3 certificates. 19
  • 20.  These Certificates are personal e-mail Certificates that allows you to secure your email messages. These certificates can be used to: 1. Digitally sign email. 2. Encrypt email. 3. Authenticate to Web Servers.  These certificates, however, do not facilitate strong authentication of the identity of the subscriber and hence, cannot be relied upon where proof of identity is required (commercial use). 20
  • 21. These Certificates are issued as Managed Digital Certificates to employees/ partners/ affiliates/ customers of business and government organizations that are ready to assume the responsibility of verifying the accuracy of the information submitted by their employees/ partners/ affiliates/ customers.  These certificates issued under the TCS-CA Trust Network are legally valid under the Indian IT Act 2000. 21
  • 22. These Certificates are issued to individuals, companies and government organizations.  They can be used both for personal and commercial purposes.  They are typically used for electronic commerce applications where security is a major concern.  These Certificates issued by the TCS-CA are legally valid under Indian IT Act 2000. 22
  • 23. We need a legally valid digital signature certificate for an individual. The relevant certificate is a class-3 certificate. 23
  • 24. The next step is to create a user account on the TCS CA website, complete an online enrollment form and generate a cryptographic key pair on our computer. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. Hence, we can conclude that digital signatures: Minimizes the risk of dealing with imposters. Minimizes the risk of undetected message tampering and forgery. Retains a high degree of information security. 29