SlideShare una empresa de Scribd logo
1 de 19
Digital Signature
Mohamed Talaat
1
Agenda
• What is Digital Signature?
• How DS work?
• General Framework of DS
• Key Requirements
• Private Key Protection
• Benefits of Digital Signature
• Drawbacks of Digital Signature
• Applications
2
3
Symmetric Key Cryptography
4
Asymmetric Key Cryptography
5
What is Digital Signature?
• Digital Signature is a type of asymmetric
cryptography used to simulate the security properties
of a signature in digital, rather than written, form.
• Digital Signature is an electronic signature that can
be used to authenticate the identity of the sender of a
message or the signer of a document, and possibly to
ensure that the original content of the message or
document that has been sent is unchanged.
How it work ?
6
7
How it work?
Message
+
Signature
Message
+
Signature
HashHash
Decrypt
Signature
With Sender’s
Public Key
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
SIGN hash
With Sender’s
Private key
Message
+
signature
Message
+
signature
COMPARECOMPARE
Calculated
Hash
Calculated
Hash
MessageMessage
Sender Receiver
HashHash
SignedMessage
Sent thru’ Internet
if
OK
Signatures
verified
8
How it work ?
• The use of digital signatures usually involves two
processes, one performed by the signer and the other
by the receiver of the digital signature:
– Digital Signature Creation
• The process is performed by the sender of the
message.
– Digital Signature Verification
• The process is performed by the receiver of the
message.
9
How it work ?
• Digital Signature Creation:
– Uses a hash result derived from and unique to both the signed
message and a given private key. For the hash result to be
secure, there must be only a negligible possibility that the same
digital signature could be created by the combination of any
other message or private key.
• Digital Signature Verification:
– is the process of checking the digital signature by reference to
the original message and a given public key, thereby
determining whether the digital signature was created for that
same message using the private key that corresponds to the
referenced public key.
10
Digital Signature Framework
11
Key Requirements
• Each individual generates his own key pair, private
and public keys.
• Private key:
– Only known by the owner/sender
– Used to create the digital signature
• Public key
– It is known to everyone.
– Used to verify the digital signature.
12
Key Requirements
• Digital Certificate:
– Digital Identity that establishes your credentials when doing
business or other transactions on the Web
– Issued by a Certifying Authority (CA)
– Contains your name, serial number, expiration dates, public
key, signature of CA.
• Certificate Authority:
– Trusted Third Party.
– An organization which issues public key certificates.
– Assures the identity of the parties to whom it issues
certificates.
– Maintains online access to the public key certificates issued.
13
Private Key Protection
14
Benefits of Digital Signature
1. Authentication
– Digital signatures can be used to authenticate the source of
messages. When ownership of a digital signature secret key is
bound to a specific user, a valid signature shows that the message
was sent by that user.
– The importance of high confidence in sender authenticity is
especially obvious in a financial context.
15
Benefits of Digital Signature
2. Integrity:
– In many scenarios, the sender and receiver of a message may
have a need for confidence that the message has not been altered
during transmission.
– Although encryption hides the contents of a message, it may be
possible to change an encrypted message without understanding
it.
– If a message is digitally signed, any change in the message will
invalidate the signature.
– Furthermore, there is no efficient way to modify a message and its
signature to produce a new message with a valid signature,
because this is still considered to be computationally infeasible by
most cryptographic hash functions.
16
Paper Signature vs. Digital Signature
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature independent
of the document
Signature depends on
the contents of the
document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
17
Drawbacks of Digital Signature
• The private key must be kept in a secure manner.
• The process of generation and verification of digital
signature requires considerable amount of time.
• For using the digital signature the user has to obtain
private and public key, the receiver has to obtain the
digital signature certificate also.
18
Applications
• Electronic Mail
• Data Storage
• Electronic Funds Transfer
• Software Distribution
• Smart Cards
• Blind Signatures
• Time Stamped Signature
Thanks 
19

Más contenido relacionado

La actualidad más candente

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 

La actualidad más candente (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 

Similar a Digital Signature

Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 

Similar a Digital Signature (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 

Más de Mohamed Talaat

Más de Mohamed Talaat (7)

Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 

Último

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Último (20)

Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 

Digital Signature

  • 2. Agenda • What is Digital Signature? • How DS work? • General Framework of DS • Key Requirements • Private Key Protection • Benefits of Digital Signature • Drawbacks of Digital Signature • Applications 2
  • 5. 5 What is Digital Signature? • Digital Signature is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. • Digital Signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
  • 7. 7 How it work? Message + Signature Message + Signature HashHash Decrypt Signature With Sender’s Public Key Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key SIGN hash With Sender’s Private key Message + signature Message + signature COMPARECOMPARE Calculated Hash Calculated Hash MessageMessage Sender Receiver HashHash SignedMessage Sent thru’ Internet if OK Signatures verified
  • 8. 8 How it work ? • The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: – Digital Signature Creation • The process is performed by the sender of the message. – Digital Signature Verification • The process is performed by the receiver of the message.
  • 9. 9 How it work ? • Digital Signature Creation: – Uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. • Digital Signature Verification: – is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 11. 11 Key Requirements • Each individual generates his own key pair, private and public keys. • Private key: – Only known by the owner/sender – Used to create the digital signature • Public key – It is known to everyone. – Used to verify the digital signature.
  • 12. 12 Key Requirements • Digital Certificate: – Digital Identity that establishes your credentials when doing business or other transactions on the Web – Issued by a Certifying Authority (CA) – Contains your name, serial number, expiration dates, public key, signature of CA. • Certificate Authority: – Trusted Third Party. – An organization which issues public key certificates. – Assures the identity of the parties to whom it issues certificates. – Maintains online access to the public key certificates issued.
  • 14. 14 Benefits of Digital Signature 1. Authentication – Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. – The importance of high confidence in sender authenticity is especially obvious in a financial context.
  • 15. 15 Benefits of Digital Signature 2. Integrity: – In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. – Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. – If a message is digitally signed, any change in the message will invalidate the signature. – Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 16. 16 Paper Signature vs. Digital Signature Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 17. 17 Drawbacks of Digital Signature • The private key must be kept in a secure manner. • The process of generation and verification of digital signature requires considerable amount of time. • For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.
  • 18. 18 Applications • Electronic Mail • Data Storage • Electronic Funds Transfer • Software Distribution • Smart Cards • Blind Signatures • Time Stamped Signature