SlideShare a Scribd company logo
3
Most read
7
Most read
13
Most read
Message Digest &
Digital Signature.
Presented By
 Lamack Jose (Roll No 16)
 Dinesh Kodam (Roll No 34)
 Manoj Patil (Roll No 36)
Concept of Hash (Message
Digest)

2
Concept of Hash (Message
Digest)

3
Idea of a Message Digest

4
Idea of a Message Digest

5
Requirement of a Message
Digest

6
Message Digest

7
Digital Signatures

farhan.mohd@yahoo.co.in

8
Digital Signatures

9
Digital Signatures

10
Steps for the process

11
Digital Signatures

12
The Sender’s Side

13
The Receiver’s Side

14
Properties of Digital Signatures
•

Digital signature does not provide
privacy. If there is a need for
privacy, another layer of
encryption/decryption must be
applied.

•
1.
2.
3.

Digital signatures can provide
Integrity,
Authentication, and
Nonrepudiation.

15
Properties of Digital Signatures

16
Properties of Digital Signatures
1.

2.

Integrity The integrity of a message is
preserved because if Eve intercepted the
message and partially or totally changed it,
the decrypted message would be
unreadable.
Authentication We can use the following
reasoning to show how a message can be
authenticated. If Eve sends a message while
pretending that it is coming from Alice, she
must use her own private key for encryption.
The message is then decrypted with the
public key of Alice and will therefore be
nonreadable. Encryption with Eve's private
key and decryption with Alice's public key
result in garbage.

17
Properties of Digital Signatures
3.

Nonrepudiation Digital signature also provides for
nonrepudiation. Bob saves the message received
from Alice. If Alice later denies sending the
message, Bob can show that encrypting and
decrypting the saved message with Alice's private
and public key can create a duplicate of the
saved message. Since only Alice knows her
private key, she cannot deny sending the
message.

18

More Related Content

What's hot (20)

PDF
RSA ALGORITHM
Dr. Shashank Shetty
 
PPTX
Hash function
Salman Memon
 
PPTX
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
PPTX
symmetric cipher model.pptx
Ajaykumar967485
 
PPT
Security Attacks.ppt
Zaheer720515
 
PPTX
key management in cryptography and network security
Sri Latha
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPTX
Session Hijacking
n|u - The Open Security Community
 
PPTX
Tor the onion router
n|u - The Open Security Community
 
PPT
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
ODP
One-Time Pad Encryption
Charles Southerland
 
PPT
Introduction to Application layer
Dr. C.V. Suresh Babu
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPTX
Legal aspects of digital forensics
KakshaPatel3
 
PPT
Network security cryptography ppt
Thushara92
 
PDF
Authentication techniques
IGZ Software house
 
PPTX
IP Address - IPv4 & IPv6
Adeel Rasheed
 
DOCX
Final Report(SuddhasatwaSatpathy)
SkyBits Technologies Pvt. Ltd.
 
RSA ALGORITHM
Dr. Shashank Shetty
 
Hash function
Salman Memon
 
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
symmetric cipher model.pptx
Ajaykumar967485
 
Security Attacks.ppt
Zaheer720515
 
key management in cryptography and network security
Sri Latha
 
Classical encryption techniques
Dr.Florence Dayana
 
Tor the onion router
n|u - The Open Security Community
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
One-Time Pad Encryption
Charles Southerland
 
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Data Encryption Standard (DES)
Haris Ahmed
 
Legal aspects of digital forensics
KakshaPatel3
 
Network security cryptography ppt
Thushara92
 
Authentication techniques
IGZ Software house
 
IP Address - IPv4 & IPv6
Adeel Rasheed
 
Final Report(SuddhasatwaSatpathy)
SkyBits Technologies Pvt. Ltd.
 

Viewers also liked (20)

PPT
Lecture1 Introduction
rajakhurram
 
PDF
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
PDF
Cryptography by Epul
Agate Studio
 
PPTX
Cryptography
pravin pandey
 
PPTX
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 
PPTX
Digital Signature
Jonathon Dosh
 
PDF
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
PDF
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
PDF
Hashing Algorithm: MD5
ijsrd.com
 
PPTX
Network security
quest university nawabshah
 
PDF
The MD5 hashing algorithm
Bob Landstrom
 
PPTX
Linux booting process
Prashant Hegde
 
PDF
Md5
annamalai
 
PPT
Ch31
bitistu
 
PDF
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
PPTX
Intro to modern cryptography
zahid-mian
 
PPTX
Byte Rotation Algorithm
Engr0918
 
PPT
Raid_intro.ppt
webhostingguy
 
PPTX
Volatile memory
Simon Paul
 
Lecture1 Introduction
rajakhurram
 
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Cryptography by Epul
Agate Studio
 
Cryptography
pravin pandey
 
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 
Digital Signature
Jonathon Dosh
 
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
Hashing Algorithm: MD5
ijsrd.com
 
Network security
quest university nawabshah
 
The MD5 hashing algorithm
Bob Landstrom
 
Linux booting process
Prashant Hegde
 
Ch31
bitistu
 
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Intro to modern cryptography
zahid-mian
 
Byte Rotation Algorithm
Engr0918
 
Raid_intro.ppt
webhostingguy
 
Volatile memory
Simon Paul
 
Ad

Similar to Message digest & digital signature (20)

PPT
Digital signature
AJAL A J
 
PPTX
DIGITAL SIGNATURE.pptx
DazzleVincent
 
PPTX
network security for cyber security in bsc.pptx
KarthikKarthik694746
 
PPT
Sindhu priya .s
Sindhu Nathan
 
PPTX
Digital signature.pptx
DaveN31
 
PPTX
Cryptography - Simplified - Message Integrity
Abdul Manaf Vellakodath
 
PPTX
Digital signature
Navneet Prakash
 
PDF
Digital Signature
Evion Technologies
 
PDF
Digital signature
Evion Technologies
 
PPTX
chapter three 3-part II-1lecture slide.pptx
meharikiros2
 
PPT
Digital signature Algorithm for cryptography.ppt
Neha gupta
 
PPT
Digital signature for college use aaaaaaaaaaaaaaaaaaaaaaaa.ppt
CPLVASUBHIMANI
 
PPT
Digital signature.ppt
MehediHasanShaon1
 
PPT
Digital Signiture
Vikesh Bawane
 
PPTX
Information Security (Digital Signatures)
Zara Nawaz
 
DOCX
Unit v
Bathshebaparimala
 
PDF
SHA_and_DS.pdf
Santosh Gupta
 
PDF
Unit 3_Digital Signature Model Details.pdf
KanchanPatil34
 
PPT
Digital Signature
Mohamed Talaat
 
PPT
Digital signature
Hossain Md Shakhawat
 
Digital signature
AJAL A J
 
DIGITAL SIGNATURE.pptx
DazzleVincent
 
network security for cyber security in bsc.pptx
KarthikKarthik694746
 
Sindhu priya .s
Sindhu Nathan
 
Digital signature.pptx
DaveN31
 
Cryptography - Simplified - Message Integrity
Abdul Manaf Vellakodath
 
Digital signature
Navneet Prakash
 
Digital Signature
Evion Technologies
 
Digital signature
Evion Technologies
 
chapter three 3-part II-1lecture slide.pptx
meharikiros2
 
Digital signature Algorithm for cryptography.ppt
Neha gupta
 
Digital signature for college use aaaaaaaaaaaaaaaaaaaaaaaa.ppt
CPLVASUBHIMANI
 
Digital signature.ppt
MehediHasanShaon1
 
Digital Signiture
Vikesh Bawane
 
Information Security (Digital Signatures)
Zara Nawaz
 
SHA_and_DS.pdf
Santosh Gupta
 
Unit 3_Digital Signature Model Details.pdf
KanchanPatil34
 
Digital Signature
Mohamed Talaat
 
Digital signature
Hossain Md Shakhawat
 
Ad

Message digest & digital signature

  • 1. Message Digest & Digital Signature. Presented By  Lamack Jose (Roll No 16)  Dinesh Kodam (Roll No 34)  Manoj Patil (Roll No 36)
  • 2. Concept of Hash (Message Digest) 2
  • 3. Concept of Hash (Message Digest) 3
  • 4. Idea of a Message Digest 4
  • 5. Idea of a Message Digest 5
  • 6. Requirement of a Message Digest 6
  • 11. Steps for the process 11
  • 15. Properties of Digital Signatures • Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. • 1. 2. 3. Digital signatures can provide Integrity, Authentication, and Nonrepudiation. 15
  • 16. Properties of Digital Signatures 16
  • 17. Properties of Digital Signatures 1. 2. Integrity The integrity of a message is preserved because if Eve intercepted the message and partially or totally changed it, the decrypted message would be unreadable. Authentication We can use the following reasoning to show how a message can be authenticated. If Eve sends a message while pretending that it is coming from Alice, she must use her own private key for encryption. The message is then decrypted with the public key of Alice and will therefore be nonreadable. Encryption with Eve's private key and decryption with Alice's public key result in garbage. 17
  • 18. Properties of Digital Signatures 3. Nonrepudiation Digital signature also provides for nonrepudiation. Bob saves the message received from Alice. If Alice later denies sending the message, Bob can show that encrypting and decrypting the saved message with Alice's private and public key can create a duplicate of the saved message. Since only Alice knows her private key, she cannot deny sending the message. 18