SlideShare una empresa de Scribd logo
1 de 37
Digital Signatures IQxplorer
Electronic Record ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Because of  4  &  5  together, these lack authenticity
Why Digital Signatures? ,[object Object],[object Object]
Encryption Caesar Cipher The shift is linear and equidistributed  3  changes I agree   lcdjuhh Key Cipher The shift is linear (cyclic)  269 k.n.gupta 62   mewam3rzjba i+3=l Space=c [+3] k+2=m (dot)=e [+6] n=w [+9]
ENCRYPTION Message 2 The Internet knows no geographical boundaries. It has redefined time and space.  Advances in computer and telecommunication technologies have led to the explosive growth of the Internet.  This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.  Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 DECRYPTION Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 2 The Internet knows no geographical boundaries. It has redefined time and space.  Advances in computer and telecommunication technologies have led to the explosive growth of the Internet.  This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.  Same Key SYMMETRIC Different Keys [Keys of a pair – Public and Private] ASYMMETRIC [PKI]
 
Digital Signatures ,[object Object],[object Object],[object Object],I agree efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 ,[object Object]
Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Click for Hash Generation
What is Digital Signature? ,[object Object],[object Object],[object Object]
Digital Signatures Each individual generates his own key pair [Public key known to everyone &  Private key only to the owner ] Private Key  – Used for making digital signature Public Key  – Used to verify the digital signature
RSA Key pair  (including Algorithm identifier) [2048 bit] Private Key 3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83 463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e a146 2840 8102 0301 0001 Public Key 3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04de 45de af46 2240 8410 02f1 0001
RCAI PUBLIC KEY [Including Algorithm Identifier] RSA – 2048 bit 3082 010a 0282 0101 00aa d454 b97c 73bf 177a 0b2f 85ab 0738 3d76 8637 980c c815 52de 2fc6 9d09 3548 9c75 1dbe c705 3ad1 cfc7 db51 033c ebf6 a367 d693 b669 29b8 c147 851a b4f9 f1e4 e361 e1e8 91ea 8283 fe2f f3d4 7fdd fbb7 d761 ebb0 4cee 41e3 6e8d 3cd9 4ae0 569c 4270 9c5a 8725 cff7 bf2a b079 cb09 de1d 22e7 0bcc 800b 6118 fa28 963f d1c6 86c1 75b2 8f80 ff5c 83a7 7310 1f03 db26 1639 61cf db36 3a2b e5a5 8aa8 c9d6 c10d 5d03 b274 b36e 1c90 d8bc d561 9278 a3d7 146f 7006 f386 8cc6 3fae 5e99 b071 7f23 fcaa 4853 e2ff 5561 5bc8 1747 42f2 c180 79fe 7d74 0ea8 4550 69e0 e0e9 d91d 75a4 c144 6211 de1f 0a0d b295 9831 8c99 ae7e 5e0e da89 0f84 14d7 5b80 373f 57cc 70ec 7232 0502 0301 0001 This key is available at  cca.gov.in  and can be downloaded
Signed Messages Message + Signature Hash Decrypt Signature With  Sender’s  Public Key SIGN hash With  Sender’s  Private key Message + signature COMPARE Calculated  Hash Message Sender Receiver Sent thru’ Internet if OK Signatures verified Hash Signed Message
Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation ,[object Object],[object Object],[object Object],[object Object]
Demonstration… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Private key protection ,[object Object],[object Object],[object Object],[object Object],[object Object]
PIN protected soft tokens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Cards ,[object Object],[object Object],[object Object],[object Object]
Hardware Tokens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card iKey Hardware Tokens Biometrics  –  adds another level of security to these tokens
 
Public Key Infrastructure (PKI) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Certifying Authority ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IDRBT Certificate Paper Electronic
Public-Key Certification Signed  by using CA’s private key User Name &  other  credentials User’s  Public key User Certificate Certificate  Database Publish Certificate Request Key pair  Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued  by CCA User Name User’s  Public Key CA’s Name Validity Digital  Signature  of CA Certificate  Class User’s Email Address Serial No.
Click for certificate generation demo Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key More than one person are required for signing HSM is housed in a strong room with video surveillance on 24x7 basis.
Trust Path ,[object Object],[object Object],[object Object],[object Object]
Role of controller   Controller of Certifying Authorities as the “Root” Authority certifies the technologies,infrastructure and practices of all  the Certifying Authorities licensed to issue Digital Signature Certificates
Four CAs has been licensed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Charges of certificates varies from Rs. 500/- to Rs. 20,000/- per year
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications in Judiciary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Applications in Telecommunications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications in Telecommunications  (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Cryptography Encryption Technologies Document Document Encrypted Document Encrypted Document Public Key of B Confidentiality Private Key of B
E-Governance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Government Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Destacado

Destacado (20)

Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Aes
AesAes
Aes
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
DES
DESDES
DES
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar a Digital Signature

Digital signatures
Digital signaturesDigital signatures
Digital signaturesApurv Gourav
 
Digital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentationDigital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentationArunsunaiComputer
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signatureKishankant Yadav
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESIRJET Journal
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyIRJET Journal
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting SystemIRJET Journal
 
Hacking BLE Bicycle Locks for Fun and a Small Profit
Hacking BLE Bicycle Locks for Fun and a Small ProfitHacking BLE Bicycle Locks for Fun and a Small Profit
Hacking BLE Bicycle Locks for Fun and a Small ProfitPriyanka Aash
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsKuldeep Singh
 
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008Oscar Groselle
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
 

Similar a Digital Signature (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentationDigital Signature.ppt power ponit presentation
Digital Signature.ppt power ponit presentation
 
ccapresentation.ppt
ccapresentation.pptccapresentation.ppt
ccapresentation.ppt
 
Digital signature online - What is digital signature
Digital signature online - What is digital signatureDigital signature online - What is digital signature
Digital signature online - What is digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
Hacking BLE Bicycle Locks for Fun and a Small Profit
Hacking BLE Bicycle Locks for Fun and a Small ProfitHacking BLE Bicycle Locks for Fun and a Small Profit
Hacking BLE Bicycle Locks for Fun and a Small Profit
 
Bio e-pen
Bio e-penBio e-pen
Bio e-pen
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
 

Más de nayakslideshare (20)

Mips 64
Mips 64Mips 64
Mips 64
 
Spyware
SpywareSpyware
Spyware
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Gis
GisGis
Gis
 
Lcd
LcdLcd
Lcd
 
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Biochip
BiochipBiochip
Biochip
 
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
 
Teleportation
TeleportationTeleportation
Teleportation
 

Último

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Digital Signature

  • 2.
  • 3.
  • 4. Encryption Caesar Cipher The shift is linear and equidistributed 3 changes I agree lcdjuhh Key Cipher The shift is linear (cyclic) 269 k.n.gupta 62 mewam3rzjba i+3=l Space=c [+3] k+2=m (dot)=e [+6] n=w [+9]
  • 5. ENCRYPTION Message 2 The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 DECRYPTION Encrypted Message 1 9a46894335be49f0b9cab28d755aaa9cd98571b275bbb0adb405e6931e856ca3e5e569edd135285482 Message 1 Central to the growth of e-commerce and e-governance is the issue of trust in electronic environment. Encrypted Message 2 a520eecb61a770f947ca856cd675463f1c95a9a2b8d4e6a71f80830c87f5715f5f59334978dd7e97da0707b48a1138d77ced56feba2b467c398683c7dbeb86b854f120606a7ae1ed934f5703672adab0d7be66dccde1a763c736cb9001d0731d541106f50bb7e54240c40ba780b7a553bea570b99c9ab3df13d75f8ccfdddeaaf3a749fd1411 Message 2 The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce. Same Key SYMMETRIC Different Keys [Keys of a pair – Public and Private] ASYMMETRIC [PKI]
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10. Digital Signatures Each individual generates his own key pair [Public key known to everyone & Private key only to the owner ] Private Key – Used for making digital signature Public Key – Used to verify the digital signature
  • 11. RSA Key pair (including Algorithm identifier) [2048 bit] Private Key 3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83 463d e493 bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d854 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1ef0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04e3 459e a146 2840 8102 0301 0001 Public Key 3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d e493 bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653 8466 0500 da44 4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc 3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4 3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39 0a8a cf42 b250 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103 a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a 63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4 bb90 bcff 9634 04de 45de af46 2240 8410 02f1 0001
  • 12. RCAI PUBLIC KEY [Including Algorithm Identifier] RSA – 2048 bit 3082 010a 0282 0101 00aa d454 b97c 73bf 177a 0b2f 85ab 0738 3d76 8637 980c c815 52de 2fc6 9d09 3548 9c75 1dbe c705 3ad1 cfc7 db51 033c ebf6 a367 d693 b669 29b8 c147 851a b4f9 f1e4 e361 e1e8 91ea 8283 fe2f f3d4 7fdd fbb7 d761 ebb0 4cee 41e3 6e8d 3cd9 4ae0 569c 4270 9c5a 8725 cff7 bf2a b079 cb09 de1d 22e7 0bcc 800b 6118 fa28 963f d1c6 86c1 75b2 8f80 ff5c 83a7 7310 1f03 db26 1639 61cf db36 3a2b e5a5 8aa8 c9d6 c10d 5d03 b274 b36e 1c90 d8bc d561 9278 a3d7 146f 7006 f386 8cc6 3fae 5e99 b071 7f23 fcaa 4853 e2ff 5561 5bc8 1747 42f2 c180 79fe 7d74 0ea8 4550 69e0 e0e9 d91d 75a4 c144 6211 de1f 0a0d b295 9831 8c99 ae7e 5e0e da89 0f84 14d7 5b80 373f 57cc 70ec 7232 0502 0301 0001 This key is available at cca.gov.in and can be downloaded
  • 13. Signed Messages Message + Signature Hash Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key Message + signature COMPARE Calculated Hash Message Sender Receiver Sent thru’ Internet if OK Signatures verified Hash Signed Message
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Smart Card iKey Hardware Tokens Biometrics – adds another level of security to these tokens
  • 21.  
  • 22.
  • 23.
  • 25. Public-Key Certification Signed by using CA’s private key User Name & other credentials User’s Public key User Certificate Certificate Database Publish Certificate Request Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No.
  • 26. Click for certificate generation demo Private key of CA or CCA require highest level of security Hardware Security Module (HSM) is used for storing the Private Key More than one person are required for signing HSM is housed in a strong room with video surveillance on 24x7 basis.
  • 27.
  • 28. Role of controller Controller of Certifying Authorities as the “Root” Authority certifies the technologies,infrastructure and practices of all the Certifying Authorities licensed to issue Digital Signature Certificates
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Public Key Cryptography Encryption Technologies Document Document Encrypted Document Encrypted Document Public Key of B Confidentiality Private Key of B
  • 35.
  • 36.