SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Encryption and digitalEncryption and digital
signaturesignature
Encrypting a DocumentEncrypting a Document
 To use a digital signature or encryption youTo use a digital signature or encryption you
must have a digital id also known as a digitalmust have a digital id also known as a digital
certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to
do two things. First, it can be used to do emaildo two things. First, it can be used to do email
encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only
be read by the person they are intended for.be read by the person they are intended for.
Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a
digital signature on a document to guaranteedigital signature on a document to guarantee
that it arrives in the same state it was originallythat it arrives in the same state it was originally
sent and no one has added or changed things.sent and no one has added or changed things.
 A digital id or digital certificate consists ofA digital id or digital certificate consists of
aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared
with everyone. Your private key is kept private.with everyone. Your private key is kept private.
These keys are text documents full of what appearsThese keys are text documents full of what appears
to be random numbers and letters, but with the properto be random numbers and letters, but with the proper
algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very
unique property.unique property.
 If you take a document and run it through an algorithmIf you take a document and run it through an algorithm
with your public key, you get back an encryptedwith your public key, you get back an encrypted
document or an encrypted email.document or an encrypted email.
 Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to
decrypt the document. The process is one way so itdecrypt the document. The process is one way so it
doesn’t matter if other people have the public key,doesn’t matter if other people have the public key,
they can’t read the document.they can’t read the document.
 To decrypt the document you must have the privateTo decrypt the document you must have the private
key. If you give the encrypted document to ankey. If you give the encrypted document to an
algorithm with the private key, you will get back thealgorithm with the private key, you will get back the
original document.original document.
An encrypted document does three things.An encrypted document does three things.
 It guarantees that the document was actually sentIt guarantees that the document was actually sent
by the sender.by the sender.
 It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified
in route.in route.
 It guarantees that no one else can read theIt guarantees that no one else can read the
document.document.
Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and
that it wasn’t modified.that it wasn’t modified.
Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures
 When transferring important documentsWhen transferring important documents
electronically, it is often necessary to certify inelectronically, it is often necessary to certify in
a reliable way who is actually the sendera reliable way who is actually the sender
(author) of a given document. One approach for(author) of a given document. One approach for
certifying the origin of documents and files iscertifying the origin of documents and files is
by using the so-called digital signatureby using the so-called digital signature
(electronic signature).(electronic signature).
 The digital signing of documents uses publicThe digital signing of documents uses public
key cryptography as a mathematical base.key cryptography as a mathematical base.
Creating a digital signatureCreating a digital signature
Extra unit 2

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 

Destacado

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Viennapathsproject
 
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Eyal Doron
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationpathsproject
 
IND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading LiteracyIND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading Literacydesignforchangechallenge
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015bibliotecasjuliomartins
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hourdesignforchangechallenge
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираmediamera
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsadesignforchangechallenge
 
Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Eyal Doron
 

Destacado (11)

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
 
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentation
 
TAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS PandiapuramTAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS Pandiapuram
 
IND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading LiteracyIND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading Literacy
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
 
Ana clara
Ana claraAna clara
Ana clara
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мира
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsa
 
Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...
 

Similar a Extra unit 2

Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cnDhaval Bhatia
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxManuE45
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Nicholas Davis
 
I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!jmoquendo
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 

Similar a Extra unit 2 (20)

D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Ds over
Ds overDs over
Ds over
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Digital signature
Digital signatureDigital signature
Digital signature
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!
 
Cryptography
CryptographyCryptography
Cryptography
 

Más de Sheetal Verma (10)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Unit 4
Unit 4Unit 4
Unit 4
 

Último

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 

Último (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 

Extra unit 2

  • 1. Encryption and digitalEncryption and digital signaturesignature
  • 2. Encrypting a DocumentEncrypting a Document  To use a digital signature or encryption youTo use a digital signature or encryption you must have a digital id also known as a digitalmust have a digital id also known as a digital certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to do two things. First, it can be used to do emaildo two things. First, it can be used to do email encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only be read by the person they are intended for.be read by the person they are intended for. Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a digital signature on a document to guaranteedigital signature on a document to guarantee that it arrives in the same state it was originallythat it arrives in the same state it was originally sent and no one has added or changed things.sent and no one has added or changed things.
  • 3.  A digital id or digital certificate consists ofA digital id or digital certificate consists of aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared with everyone. Your private key is kept private.with everyone. Your private key is kept private. These keys are text documents full of what appearsThese keys are text documents full of what appears to be random numbers and letters, but with the properto be random numbers and letters, but with the proper algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very unique property.unique property.  If you take a document and run it through an algorithmIf you take a document and run it through an algorithm with your public key, you get back an encryptedwith your public key, you get back an encrypted document or an encrypted email.document or an encrypted email.
  • 4.  Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to decrypt the document. The process is one way so itdecrypt the document. The process is one way so it doesn’t matter if other people have the public key,doesn’t matter if other people have the public key, they can’t read the document.they can’t read the document.  To decrypt the document you must have the privateTo decrypt the document you must have the private key. If you give the encrypted document to ankey. If you give the encrypted document to an algorithm with the private key, you will get back thealgorithm with the private key, you will get back the original document.original document.
  • 5. An encrypted document does three things.An encrypted document does three things.  It guarantees that the document was actually sentIt guarantees that the document was actually sent by the sender.by the sender.  It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified in route.in route.  It guarantees that no one else can read theIt guarantees that no one else can read the document.document. Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and that it wasn’t modified.that it wasn’t modified.
  • 6. Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures  When transferring important documentsWhen transferring important documents electronically, it is often necessary to certify inelectronically, it is often necessary to certify in a reliable way who is actually the sendera reliable way who is actually the sender (author) of a given document. One approach for(author) of a given document. One approach for certifying the origin of documents and files iscertifying the origin of documents and files is by using the so-called digital signatureby using the so-called digital signature (electronic signature).(electronic signature).  The digital signing of documents uses publicThe digital signing of documents uses public key cryptography as a mathematical base.key cryptography as a mathematical base.
  • 7. Creating a digital signatureCreating a digital signature