SlideShare una empresa de Scribd logo
1 de 12
Digital Signature
Digital Signature
• 1. Digital Signature is a type of electronic signature
that encrypts documents with digital codes that are
particularly difficult to duplicate
• 2. In case of digital signature message is encrypted
with the private key and decrypted with the public
key.
On BOB
On FRANK side
Digital Signature Algorithm
7
At Sender Side
•1. Message digest is generated using a set of Hash functions.
•2. A message digest is encrypted using senders private key.
•3. The resulting encrypted message is known as digital
signature.
•4. Digital signature is attached with data or message and send
to receiver.
At Receiver Side
1. Receiver uses senders public key to decrypt senders digital
signature to obtain message digest send by receiver.
2. Receiver uses same message digest algorithm, which is used
by sender
3. Now, receiver will compare these two message digest
4. If message digest are equal then signature is valid else not.
Advantages
• Authentication:
– Identification of person sign.
• Integrity od data:
– Every change is detected.
• Non Repudiation:
– Author has encrypted sign on message.
• Speed:
– Contracts are easily written, completed, and signed by all
concerned parties in a little amount of time no matter how far the
parties are geographically.
Disadvantages
• Expiry
• Certificate issue procedures
• Software compatibility
For more detail contact us

Más contenido relacionado

Similar a Digital signature

L4 internet security
L4   internet securityL4   internet security
L4 internet security
listergc
 

Similar a Digital signature (20)

E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
SHA_and_DS.pdf
SHA_and_DS.pdfSHA_and_DS.pdf
SHA_and_DS.pdf
 
Unit v
Unit vUnit v
Unit v
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
DSA.ppt
DSA.pptDSA.ppt
DSA.ppt
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Email sec11
Email sec11Email sec11
Email sec11
 
DIGITAL SIGNATURE.pptx
DIGITAL SIGNATURE.pptxDIGITAL SIGNATURE.pptx
DIGITAL SIGNATURE.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Genia Solution
Genia SolutionGenia Solution
Genia Solution
 

Más de swatihans

heuristic - best search and a*
heuristic - best search and a*heuristic - best search and a*
heuristic - best search and a*
swatihans
 
components of computer
components of computercomponents of computer
components of computer
swatihans
 
Digital signature
Digital signatureDigital signature
Digital signature
swatihans
 
Computer Graphics transformations
Computer Graphics transformationsComputer Graphics transformations
Computer Graphics transformations
swatihans
 

Más de swatihans (6)

heuristic - best search and a*
heuristic - best search and a*heuristic - best search and a*
heuristic - best search and a*
 
components of computer
components of computercomponents of computer
components of computer
 
Digital signature
Digital signatureDigital signature
Digital signature
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
 
cryptography
cryptographycryptography
cryptography
 
Computer Graphics transformations
Computer Graphics transformationsComputer Graphics transformations
Computer Graphics transformations
 

Último

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Último (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 

Digital signature

  • 2. Digital Signature • 1. Digital Signature is a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate • 2. In case of digital signature message is encrypted with the private key and decrypted with the public key.
  • 3.
  • 6.
  • 8.
  • 9. At Sender Side •1. Message digest is generated using a set of Hash functions. •2. A message digest is encrypted using senders private key. •3. The resulting encrypted message is known as digital signature. •4. Digital signature is attached with data or message and send to receiver.
  • 10. At Receiver Side 1. Receiver uses senders public key to decrypt senders digital signature to obtain message digest send by receiver. 2. Receiver uses same message digest algorithm, which is used by sender 3. Now, receiver will compare these two message digest 4. If message digest are equal then signature is valid else not.
  • 11. Advantages • Authentication: – Identification of person sign. • Integrity od data: – Every change is detected. • Non Repudiation: – Author has encrypted sign on message. • Speed: – Contracts are easily written, completed, and signed by all concerned parties in a little amount of time no matter how far the parties are geographically.
  • 12. Disadvantages • Expiry • Certificate issue procedures • Software compatibility For more detail contact us