SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Seminar
        on
Digital Signature




Submitted to:       Submitted by:
Prof. K.K.Agarwal   Khushboo Dexit
Outline
1. Digital Signature
2. Why Digital Signature?
3. Conventional Signature Vs. Digital
   Signature
4. Digital Signature Schemes
5. Public Key Encryption
6. How digital Signature works?
7. Digital Certificates
8. Certifying Authority
9. Private Key Protection
Digital Signature

• A digital signature is a mathematical scheme for demonstrating
  the authenticity of a digital message or document.
• A digital signature is an electronic signature.
• A digital signature is basically a way to ensure that an electronic
  document.
• A digital signature is a type of public key cryptography.
Why Digital Signature?
Conventional Signature Vs. Digital
              Signature


 A signature is physically part of the document being signed. A
  digital signature is not attached physically to the message that is
  signed.
 A signature is verified by comparing it to authentic signatures.
  Digital signatures can be verified using a publicly known
  verification algorithm.
 A copy of a signed paper document can usually be distinguished
  from an original. A “copy” of a signed digital message is identical
  to the original.
Digital Signature Schemes


The following are the widely used Schemes for Digital Signature:
• RSA Scheme
• ElGamal Scheme
• Schnorr Scheme
• Digital Signature Standard (DSS)
Public Key Encryption

•   Involves 2 distinct keys:
           public
           private

•   It is also called “asymmetric cryptography”.
•   Two keys are mathematically related.

                      Public Key                   Private Key


                                   Cipher text
    Plaintext         Encryption                   Decryption    Plaintext
Message Encryption
(User A sends message to User B)

         Public Key Directory


                         User B’s Public Key




                                               Encrypted
  Text                                           Text

                                Encryption


           User A
Transfer Encrypted Data



                                User B
 User A




            Insecure Channel
Encrypted                      Encrypted
  Text                           Text
Decryption with your Private key
                                       Private key stored in
Encrypted                              your personal computer
  Text



             User B
                                      User B’s
                                      Private key
            Decryption




                      Original Text
How to use 2 different keys?

• Just an example:
   – Public Key = 4, Private Key = 1/4, message M = 5
   – Encryption:
      • Cipher text C = M * Public Key
      • 5 * 4 = 20
   – Decryption:
      • Plaintext M = C * Private Key
      • 20 * ¼ = 5
A cryptosystem uses the private and public keys of the
receiver.
A digital signature uses the private and public keys of the
sender.

So Digital Signature uses a Reverse Public Key Cryptography.
How digital Signature works?

                                 Transmit via the Internet
User A




 Use A’s private key to sign the document


                    Verify the signature                     User B received
                    by A’s public key stored                 the document with
                    at the directory                         signature attached


                                                                  User B
Example of Digital Signature

• I agree
     efcc61c1c03db8d8ea8569545c073c814a0ed755
• My place of birth is at Gwalior.
     fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
• I am 62 years old.
     0e6d7d56c4520756f59235b6ae981cdb5f9820a0
• I am an Engineer.
     ea0ae29b3b2c20fc018aaca45c3746a057b893e7
Digital Certificates


• Digital Certificate is a data with digital signature from one
trusted Certification Authority (CA).

• This digital certificate contains:
    Who owns this certificate
    Who signed this certificate
    The expired date
    User name & email address
Certifying Authority

• Trusted Third Party.
• An organization which issues public key certificates.
• Assures the identity of the parties to whom it issues
  certificates.
• Maintains online access to the public key certificates issued
• A trusted agent who certifies public keys for general use
  (Corporation or Bank).
Private Key Protection




                               Hardware tokens
Soft Token




                  Smart card
Seminar on Digital Signature: An Overview

Más contenido relacionado

La actualidad más candente (20)

Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
cryptography
cryptographycryptography
cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 

Destacado

Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010Umang Gupta
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Digital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskDigital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskChunJia Sio
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital signatures
 Digital signatures Digital signatures
Digital signaturesSTUDENT
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentationbrettlieberman
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13ravik09783
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system60ml
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 

Destacado (18)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskDigital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage risk
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
Digital signature ppt
Digital signature pptDigital signature ppt
Digital signature ppt
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 

Similar a Seminar on Digital Signature: An Overview

Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Bitcoin Association of Australia
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptxDaveN31
 
Digital signature
Digital signatureDigital signature
Digital signatureswatihans
 
Digital signature
Digital signatureDigital signature
Digital signatureswatihans
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,salutiontechnology
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1AsrithaKorupolu
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_emadunix
 

Similar a Seminar on Digital Signature: An Overview (20)

Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
cyber security-2.pptx
cyber security-2.pptxcyber security-2.pptx
cyber security-2.pptx
 
Digital signature.ppt
Digital signature.pptDigital signature.ppt
Digital signature.ppt
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_e
 

Seminar on Digital Signature: An Overview

  • 1. Seminar on Digital Signature Submitted to: Submitted by: Prof. K.K.Agarwal Khushboo Dexit
  • 2. Outline 1. Digital Signature 2. Why Digital Signature? 3. Conventional Signature Vs. Digital Signature 4. Digital Signature Schemes 5. Public Key Encryption 6. How digital Signature works? 7. Digital Certificates 8. Certifying Authority 9. Private Key Protection
  • 3. Digital Signature • A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. • A digital signature is an electronic signature. • A digital signature is basically a way to ensure that an electronic document. • A digital signature is a type of public key cryptography.
  • 5. Conventional Signature Vs. Digital Signature  A signature is physically part of the document being signed. A digital signature is not attached physically to the message that is signed.  A signature is verified by comparing it to authentic signatures. Digital signatures can be verified using a publicly known verification algorithm.  A copy of a signed paper document can usually be distinguished from an original. A “copy” of a signed digital message is identical to the original.
  • 6. Digital Signature Schemes The following are the widely used Schemes for Digital Signature: • RSA Scheme • ElGamal Scheme • Schnorr Scheme • Digital Signature Standard (DSS)
  • 7. Public Key Encryption • Involves 2 distinct keys:  public  private • It is also called “asymmetric cryptography”. • Two keys are mathematically related. Public Key Private Key Cipher text Plaintext Encryption Decryption Plaintext
  • 8. Message Encryption (User A sends message to User B) Public Key Directory User B’s Public Key Encrypted Text Text Encryption User A
  • 9. Transfer Encrypted Data User B User A Insecure Channel Encrypted Encrypted Text Text
  • 10. Decryption with your Private key Private key stored in Encrypted your personal computer Text User B User B’s Private key Decryption Original Text
  • 11. How to use 2 different keys? • Just an example: – Public Key = 4, Private Key = 1/4, message M = 5 – Encryption: • Cipher text C = M * Public Key • 5 * 4 = 20 – Decryption: • Plaintext M = C * Private Key • 20 * ¼ = 5
  • 12. A cryptosystem uses the private and public keys of the receiver. A digital signature uses the private and public keys of the sender. So Digital Signature uses a Reverse Public Key Cryptography.
  • 13. How digital Signature works? Transmit via the Internet User A Use A’s private key to sign the document Verify the signature User B received by A’s public key stored the document with at the directory signature attached User B
  • 14.
  • 15. Example of Digital Signature • I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 • My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 • I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 • I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7
  • 16. Digital Certificates • Digital Certificate is a data with digital signature from one trusted Certification Authority (CA). • This digital certificate contains: Who owns this certificate Who signed this certificate The expired date User name & email address
  • 17. Certifying Authority • Trusted Third Party. • An organization which issues public key certificates. • Assures the identity of the parties to whom it issues certificates. • Maintains online access to the public key certificates issued • A trusted agent who certifies public keys for general use (Corporation or Bank).
  • 18. Private Key Protection Hardware tokens Soft Token Smart card