SEMINAR
ON
DIGITAL SINGNATURE
PRESENTED BY
NITIN KHANDELWAL
Electronics & Communication
Shriram College of Engg. And Management.
Outline
Introduction
What is Digital Signature ?
Kinds of Digital Signature
Example
Importance of Digital Signature
Introduction
Most powerful single tool that users can
use to secure the internet.
A Process Strongly associated with the
public key encryption.
Helps in making larger security requirements.
Outline
Introduction
What is Digital Signature ?
Kinds of Digital Signature
Practical Example
Importance of Digital Signature
DIGITAL SIGNATURE
Not Simply type of name or image of a
handwritten signature
Based on Public And Private Key encryption
Associated with a Digital Documents
Outline
Introduction
What is Digital Signature ?
Kinds of Digital Signature
Practical Example
Importance of Digital Signature
Kinds of Digital Signature
Private key cryptography- For signing
Public key cryptography- For verifying signature
Outline
Introduction
What is Digital Signature ?
Kinds of Digital Signature
Practical Example
Importance of Digital Signature
Practical Example: Bob is a Character
Bob's public key
Bob's private key
Bob’s Co-workers
Anyone can get Bob's Public
Key, but Bob keeps his Private
Key to himself
Pat Doug Susan
contd…..
"Hey Bob, how about HNFmsEm6UnBejhhyC
lunch at Taco Bell. I GKOKJUxhiygSBCEiC
hear they have free YIh/Hn3xgKyLK1UCFH
refills!"
DC/A
HNFmsEm6UnBejhhy "Hey Bob, how about
CKOKJUxhiygSBEiCYI lunch at Taco Bell. I
h/Hn3xgKyLK1UCFH hear they have free
refills!"
DC/A
To sign a document, Bob's software will crunch down the
data into just a few lines by a process called "hashing".
These few lines are called a message digest. (It is not
possible to change a message digest back into the
original data from which it was created.)
Bob's software then encrypts the message digest with his
private key. The result is the digital signature.
contd….
Finally, Bob's software appends the digital signature to document.
All of the data that was hashed has been signed.
Bob now passes the document on to Pat.
Contd…..
First, Pat's software decrypts the signature (using Bob's
public key) changing it back into a message digest. If this
worked, then it proves that Bob signed the document,
because only Bob has his private key. Pat's software then
hashes the document data into a message digest. If the
message digest is the same as the message digest
created when the signature was decrypted, then Pat
knows that the signed data has not been changed.
Plot complication...
Contd…..
Doug (our disgruntled employee) wishes to deceive
Pat. Doug makes sure that Pat receives a signed
message and a public key that appears to belong to
Bob. Unbeknownst to Pat, Doug deceitfully sent a key
pair he created using Bob's name. Short of receiving
Bob's public key from him in person, how can Pat be
sure that Bob's public key is authentic?
It just so happens that Susan works at the company's
certificate authority center. Susan can create a digital
certificate for Bob simply by signing Bob's public key as well as
some information about Bob.
Contd…..
Bob Info:
Name
Department
Cubical Number
Certificate Info:
Expiration Date
Serial Number
Bob's Public Key:
Now Bob's co-workers can check Bob's trusted certificate to
make sure that his public key truly belongs to him. In fact, no
one at Bob's company accepts a signature for which there does
not exist a certificate generated by Susan.
Contd…..
Let's say that Bob sends a signed document to Pat. To verify the
signature on the document, Pat's software first uses Susan's (the
certificate authority's) public key to check the signature on Bob's
certificate. Successful de-encryption of the certificate proves
that Susan created it.
Pat's software then takes Bob's public key from the certificate
and uses it to check Bob's signature. If Bob's public key de-
encrypts the signature successfully, then Pat is assured that the
signature was created using Bob's private key, for Susan has
certified the matching public key. And of course, if the
signature is valid, then we know that Doug didn't try to change
the signed content.
Outline
Introduction
What is Digital Signature ?
Kinds of Digital Signature
Practical Example
Importance of Digital Signature
Importance of Digital Signature
To protect privacy and confidentiality.
The Leaders save time and Money
Digital Signature is expensive, But it pays for it
self.
Any Queries?
T H A N K S