SlideShare una empresa de Scribd logo
1 de 33
Presentation  on Digital  Signatures…!
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Private key encryption is essentially the same as a secret code that the two computers must each know in order to decode the information. The code would provide the key to decoding the message.  Think of it like this. You create a coded message to send to a friend where each letter is substituted by the letter that is second from it. So "A" becomes "C" and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will only see nonsense .
[object Object],[object Object]
The key is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value. Here's a simple example:  Input number   Hashing algorithm   Hash value 10667   Input # x 143   1525381
[object Object],[object Object],[object Object],[object Object]
Digital signatures are used to verify that a message or document was authored by a certain person, and that it was not altered or modified by anyone else. Encryption and digital signatures can be used together, or separately a message may be encrypted, but not digitally signed (only people with the key can read it, but the reader cannot be certain who actually wrote it)
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
For other keys, use the key to skip the specified number of letters. If the original message is CATS HAVE FUR then the encrypted version depends on the key as follows: (key = 1) DBUT IBWF GVS (key = 2) ECVU JCXG HWT (key = 3) FDWV KDYH IXU ...and so forth
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
To use digital signature software requires some initial setup: you will need a signing certificate.  Digital signatures can help you save time and paper-handling costs. Example: If in your business you commonly sign documents or need to verify the authenticity of documents.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
The formula depends on two inputs: the sequence of characters representing the electronic data to be signed, and a secret number referred to as a signature's private key, associated with the signing party and which only that party has access to. The resulting computed value, representing the digital signature, is then attached to the electronic data just as a paper signature becomes a part of a paper document.
[object Object],[object Object],[object Object]
Here, the formula depends on three inputs: The sequence of characters representing the supposedly originally signed electronic data, the public key of the signing party, and the value representing the supposedly authentic digital signature.    The output of the formula is a simple answer: yes or no. 'Yes' signifies that the digital signature is indeed an authentic digital signature on the presented electronic data, and it is associated with the party linked to the public key being used.
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
•  Evidence: In order for the document to have power, the originator has to prove he or she is the sole owner and executioner of the document.  This is what the digital signature does. It provides the necessary evidence to those viewing the document that it is real and the person signing it is real.  •  Ceremony:  Basically, any time a document is signed it is based on a ceremony or tradition of making the document legal.  Without the signature, the document would not be validated as authentic and legal.  Providing a digital signature proves that the signor is entering into a commitment voluntarily
•  Approval :  As is stated by law, when a document must be made legal, it needs to be approved in order for the information to be turned legal and acted on. By placing a digital signature on the document makes it this way.  This way the document can be acted on in a legal way. •  Efficiency:  One thing the digital signature does is if saves time and money because the signature turns the document instead a legal transaction.  This way no further inquiries are needed to verify or clarify the information on the document, as being legit or not.
The Noble County Surveyor's Office uses a digital signature system on their publicly signed papers. This means your signature is securely applied to a digital document. It’s more secure than a pen and ink signature, and it saves   paper and time. ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Integrity of data , every change will be detected;  No repudiation , because the author can not denied that he has written and sent;
The  Advantages  of using digital signatures include:  •  Imposter prevention:  By using digital signatures you are eliminating the possibility of committing fraud by an imposter signing the document. Since the digital signature cannot be altered, this makes forging the signature impossible. •  Message integrity: By having a digital signature you are in fact proving the document to be valid. You are assuring the recipient that the document is free from forgery or false information.
[object Object],[object Object],[object Object],[object Object],[object Object]
Q U E R I E s ?
Thank you  & Signing off Silpa END

Más contenido relacionado

La actualidad más candente

Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
ravijain90
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 

La actualidad más candente (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Similar a D.Silpa

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 

Similar a D.Silpa (20)

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
What is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dscWhat is digital signature certificate ,how to apply online dsc
What is digital signature certificate ,how to apply online dsc
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfDIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdf
 
Digital signature by SSL Europa
Digital signature by SSL EuropaDigital signature by SSL Europa
Digital signature by SSL Europa
 

Más de st anns PG College,Mallapur,Hyderabad, India (14)

Nubia Group Friendships Day1
Nubia Group  Friendships Day1Nubia Group  Friendships Day1
Nubia Group Friendships Day1
 
Lousina
LousinaLousina
Lousina
 
Sruthi
SruthiSruthi
Sruthi
 
Prashanthi
PrashanthiPrashanthi
Prashanthi
 
M.Swathi
M.SwathiM.Swathi
M.Swathi
 
A varalaxmi
 A varalaxmi A varalaxmi
A varalaxmi
 
Y.Madhavi
Y.MadhaviY.Madhavi
Y.Madhavi
 
T.Jhansi
T.JhansiT.Jhansi
T.Jhansi
 
B Shilpa
B ShilpaB Shilpa
B Shilpa
 
D Archana
D ArchanaD Archana
D Archana
 
H Vijayalakshmi
H VijayalakshmiH Vijayalakshmi
H Vijayalakshmi
 
P Sweta
P SwetaP Sweta
P Sweta
 
Y Archana
Y ArchanaY Archana
Y Archana
 
M Ramya
M RamyaM Ramya
M Ramya
 

Último

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

D.Silpa

  • 1. Presentation on Digital Signatures…!
  • 2.
  • 3.
  • 4.
  • 5. Private key encryption is essentially the same as a secret code that the two computers must each know in order to decode the information. The code would provide the key to decoding the message. Think of it like this. You create a coded message to send to a friend where each letter is substituted by the letter that is second from it. So "A" becomes "C" and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will only see nonsense .
  • 6.
  • 7. The key is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value. Here's a simple example: Input number Hashing algorithm Hash value 10667 Input # x 143 1525381
  • 8.
  • 9. Digital signatures are used to verify that a message or document was authored by a certain person, and that it was not altered or modified by anyone else. Encryption and digital signatures can be used together, or separately a message may be encrypted, but not digitally signed (only people with the key can read it, but the reader cannot be certain who actually wrote it)
  • 10.
  • 11.
  • 12. For other keys, use the key to skip the specified number of letters. If the original message is CATS HAVE FUR then the encrypted version depends on the key as follows: (key = 1) DBUT IBWF GVS (key = 2) ECVU JCXG HWT (key = 3) FDWV KDYH IXU ...and so forth
  • 13.
  • 14.
  • 15.
  • 16. To use digital signature software requires some initial setup: you will need a signing certificate. Digital signatures can help you save time and paper-handling costs. Example: If in your business you commonly sign documents or need to verify the authenticity of documents.
  • 17.
  • 18.
  • 19.
  • 20. The formula depends on two inputs: the sequence of characters representing the electronic data to be signed, and a secret number referred to as a signature's private key, associated with the signing party and which only that party has access to. The resulting computed value, representing the digital signature, is then attached to the electronic data just as a paper signature becomes a part of a paper document.
  • 21.
  • 22. Here, the formula depends on three inputs: The sequence of characters representing the supposedly originally signed electronic data, the public key of the signing party, and the value representing the supposedly authentic digital signature. The output of the formula is a simple answer: yes or no. 'Yes' signifies that the digital signature is indeed an authentic digital signature on the presented electronic data, and it is associated with the party linked to the public key being used.
  • 23.  
  • 24.
  • 25. • Evidence: In order for the document to have power, the originator has to prove he or she is the sole owner and executioner of the document. This is what the digital signature does. It provides the necessary evidence to those viewing the document that it is real and the person signing it is real. • Ceremony: Basically, any time a document is signed it is based on a ceremony or tradition of making the document legal. Without the signature, the document would not be validated as authentic and legal. Providing a digital signature proves that the signor is entering into a commitment voluntarily
  • 26. • Approval : As is stated by law, when a document must be made legal, it needs to be approved in order for the information to be turned legal and acted on. By placing a digital signature on the document makes it this way. This way the document can be acted on in a legal way. • Efficiency: One thing the digital signature does is if saves time and money because the signature turns the document instead a legal transaction. This way no further inquiries are needed to verify or clarify the information on the document, as being legit or not.
  • 27.
  • 28.
  • 29.
  • 30. The Advantages of using digital signatures include: • Imposter prevention: By using digital signatures you are eliminating the possibility of committing fraud by an imposter signing the document. Since the digital signature cannot be altered, this makes forging the signature impossible. • Message integrity: By having a digital signature you are in fact proving the document to be valid. You are assuring the recipient that the document is free from forgery or false information.
  • 31.
  • 32. Q U E R I E s ?
  • 33. Thank you & Signing off Silpa END