2
Most read
5
Most read
12
Most read
BY: SUMAN SAURAV
 
ENCRYPT ( LOCK ) Message Ciphertext “ Secret” Key DECRYPT ( UNLOCK ) Ciphertext Message (Sender) (Receiver)
ENCRYPT (LOCK) Cleartext Ciphertext Public Key DECRYPT (UNLOCK) Ciphertext Private Key Cleartext (Sender) (Receiver)
 
Digital Identity that establishes your credentials when doing business or other transactions on the Web Issued by a Certifying Authority (CA) Contains your name, serial number, expiration dates, public key, signature of CA
Trusted Third Party An organization which issues public key certificates Assures the identity of the parties to whom it issues certificates Maintains online access to the public key certificates issued
Signed  by using CA’s private key User Name &  other  credentials User’s  Public key User Certificate Certificate  Database Publish Certificate Request Key pair  Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued  by CCA User Name User’s  Public Key CA’s Name Validity Digital  Signature  of CA Certificate  Class User’s Email Address Serial No.
Uses secure hash algorithm Condenses message to 160 bit Key size 512-1024 bits Proposed by NIST in 1991 Adopted
Soft Token Hardware tokens Smart card
 
Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free
 

More Related Content

PPTX
Digital certificates
PDF
Digital signatures
PPT
Digital signature
PPTX
Digital signature
PDF
E mail security using Certified Electronic Mail (CEM)
PPTX
Digital signature & certificate
PPTX
Digital signature
PPT
Digital signature
Digital certificates
Digital signatures
Digital signature
Digital signature
E mail security using Certified Electronic Mail (CEM)
Digital signature & certificate
Digital signature
Digital signature

What's hot (20)

PPTX
Introduction to Public Key Infrastructure
PPT
Digital Signature
PPTX
Digital signature
PPTX
Digital signature 2
PPTX
Seminar ppt on digital signature
PPSX
Secure socket layer
PPTX
Digital signature and certificate authority
PPT
Presentation on digital signatures & digital certificates
PPTX
Digital signature(Cryptography)
PPTX
Cryptography
PPT
Digital signature
PPTX
Digital Signature.pptx
PPT
Digital certificates
PPTX
Public key infrastructure
PPTX
Kerberos
PPT
DIGITAL SIGNATURE
PPT
Digital Signature
PPT
X.509 Certificates
PDF
Public key Infrastructure (PKI)
Introduction to Public Key Infrastructure
Digital Signature
Digital signature
Digital signature 2
Seminar ppt on digital signature
Secure socket layer
Digital signature and certificate authority
Presentation on digital signatures & digital certificates
Digital signature(Cryptography)
Cryptography
Digital signature
Digital Signature.pptx
Digital certificates
Public key infrastructure
Kerberos
DIGITAL SIGNATURE
Digital Signature
X.509 Certificates
Public key Infrastructure (PKI)
Ad

Viewers also liked (20)

PPT
Introduction to Digital signatures
PPTX
Public key cryptography and message authentication
 
PPTX
Static dynamic and active web pages
PPSX
Advanced Encryption Standard (AES)
PPT
AES Cryptosystem
PDF
Data Encryption Standard
PPT
Data encryption standard (des)
PPT
PDF
Advanced Encryption Standard (AES)
PDF
cns 2marks
DOCX
Data encryption standard
PPT
Cryptography
PPTX
Trible data encryption standard (3DES)
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPTX
Hash Function
PPTX
Substitution Cipher
PPTX
Aes (advance encryption standard)
Introduction to Digital signatures
Public key cryptography and message authentication
 
Static dynamic and active web pages
Advanced Encryption Standard (AES)
AES Cryptosystem
Data Encryption Standard
Data encryption standard (des)
Advanced Encryption Standard (AES)
cns 2marks
Data encryption standard
Cryptography
Trible data encryption standard (3DES)
Advanced Encryption Standard (AES) Implementaion using Java
Hash Function
Substitution Cipher
Aes (advance encryption standard)
Ad

Similar to Digital Signature (20)

PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PPT
PKI and Applications
PPT
Introduction to distributed security concepts and public key infrastructure m...
PDF
Computer security module 4
PPT
Public Key Infrastructure and Application_Applications.ppt
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPTX
Key exchange in crypto
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
PPT
Secure payment systems
PPT
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
PPT
PKI_Applications digital certificate.ppt
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PPTX
The last picks
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PKI and Applications
Introduction to distributed security concepts and public key infrastructure m...
Computer security module 4
Public Key Infrastructure and Application_Applications.ppt
Key exchange in crypto
Key exchange in crypto
Key exchange in crypto
Key exchange in crypto
Key exchange in crypto
Key exchange in crypto
Key exchange in crypto
Ch12 Cryptographic Protocols and Public Key Infrastructure
Secure payment systems
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
PKI_Applications digital certificate.ppt
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
The last picks

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Unlock new opportunities with location data.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Zenith AI: Advanced Artificial Intelligence
DOCX
search engine optimization ppt fir known well about this
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting Started with Data Integration: FME Form 101
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
The various Industrial Revolutions .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
Univ-Connecticut-ChatGPT-Presentaion.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
Unlock new opportunities with location data.pdf
observCloud-Native Containerability and monitoring.pptx
1 - Historical Antecedents, Social Consideration.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Geologic Time for studying geology for geologist
Zenith AI: Advanced Artificial Intelligence
search engine optimization ppt fir known well about this
DP Operators-handbook-extract for the Mautical Institute
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
Getting Started with Data Integration: FME Form 101
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
The various Industrial Revolutions .pptx
Hindi spoken digit analysis for native and non-native speakers

Digital Signature

  • 2.  
  • 3. ENCRYPT ( LOCK ) Message Ciphertext “ Secret” Key DECRYPT ( UNLOCK ) Ciphertext Message (Sender) (Receiver)
  • 4. ENCRYPT (LOCK) Cleartext Ciphertext Public Key DECRYPT (UNLOCK) Ciphertext Private Key Cleartext (Sender) (Receiver)
  • 5.  
  • 6. Digital Identity that establishes your credentials when doing business or other transactions on the Web Issued by a Certifying Authority (CA) Contains your name, serial number, expiration dates, public key, signature of CA
  • 7. Trusted Third Party An organization which issues public key certificates Assures the identity of the parties to whom it issues certificates Maintains online access to the public key certificates issued
  • 8. Signed by using CA’s private key User Name & other credentials User’s Public key User Certificate Certificate Database Publish Certificate Request Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate . Public License issued by CCA User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No.
  • 9. Uses secure hash algorithm Condenses message to 160 bit Key size 512-1024 bits Proposed by NIST in 1991 Adopted
  • 10. Soft Token Hardware tokens Smart card
  • 11.  
  • 12. Paper signatures v/s Digital Signatures V/s Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non-repudiation Handwriting expert needed Error prone Any computer user Error free
  • 13.