SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Submitted To:
Deepak Kumar
Verma
Submitted By:
Ravi Ranjan
1309010119
CONTENT
 Introduction
 What is Digital Signature
 Why Digital Signature
 Basic Requirements
 How the Technology Works
 Approaches
CONTENT
 Purpose of Digital Signature
 Challenges and Opportunities
 Application
 Drawbacks
 Conclusion
INTRODUCTION
 The authenticity of many legal, financial, and
other documents is determined by the presence
or absence of an authorized handwritten
signature.
 We have various method to solve this problem,
but the use of ‘digital signature’ is definitely the
best solution amongst them.
 A digital signature is nothing but an attachment
to any piece of electronic information, which
represents the content of the document and the
identity of the originator of that document
uniquely.
WHAT IS DIGITAL SIGNATURE
 Hash value of a message when encrypted with the private
key of a person is his digital signature on that e-Document.
 Digital Signature of a person therefore varies from
document to document thus ensuring authenticity of each
word of that document.
 As the public key of the signer is known, anybody can verify
the message and the digital signature.
WHY DIGITAL SIGNATURES
• To provide Authenticity, Integrity and Non-
repudiation to electronic documents
• To use the Internet as the safe and secure
medium for e-Commerce and e-Governance
BASIC REQUIREMENTS….
 Private Key
The private key is one which is accessible only to the
signer. It is used to generate the digital signature which is
then attached to the message.
 Public Key
The public key is made available to all those who receive
the signed messages from the sender. It is used for
verification of the received message.
BASIC REQUIREMENTS
Digital Signature Certificate
• A subscriber of the private key and public key pair
makes the public key available to all those who are
intended to receive the signed messages from the
subscriber.
• But in case of any dispute between the two sides,
there must be some entity with the receiver which will
allow the receiver of the message to prove that the
message was indeed sent by the subscriber of the key
pair. This can be done with the Digital Signature
Certificate.
HOW THE TECHNOLOGY WORKS
DIGITAL SIGNATURE ALGORITHM….
 Digital Signature Generation
DIGITAL SIGNATURE ALGORITHM….
 Digital Signature Verification
PURPOSE OF DIGITAL SIGNATURE
 Signer authentication
 Message authentication
 Non-repudiation
 Integrity
CHALLENGES AND OPPORTUNITIES
 Institutional overhead:
The cost of establishing and utilizing certification
authorities, repositories, and other important
services, as well as assuring quality in the
performance of their functions.
 Subscriber and Relying Party Costs:
A digital signer will require software, and will
probably have to pay a certification authority
some price to issue a certificate. Hardware to
secure the subscriber's private key may also be
advisable.
APPLICATIONS …..
Electronic Mail
Data storage
Electronic funds transfer
Software Distribution
DRAWBACKS
 The private key must be kept in a secured manner.
 The process of generation and verification of digital
signature requires considerable amount of time.
 For using the digital signature the user has to obtain
private and public key, the receiver has to obtain the
digital signature certificate also.
CONCLUSION
Digital signatures are difficult to understand. Digital
signatures will be championed by many players that
the public distrusts, including national security
agencies, law enforcement agencies, and consumer
marketing companies.
REFERENCES
 www.wikipedia.com
 www.google.com
THANKS…!!!

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Key management
Key managementKey management
Key management
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 

Ähnlich wie Seminar presentation on digital signature ppt

digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfMehediHasanShaon1
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxManuE45
 
Digital signature
Digital signatureDigital signature
Digital signatureJanani S
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 

Ähnlich wie Seminar presentation on digital signature ppt (20)

digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 

Kürzlich hochgeladen

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 

Kürzlich hochgeladen (20)

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 

Seminar presentation on digital signature ppt

  • 1. Submitted To: Deepak Kumar Verma Submitted By: Ravi Ranjan 1309010119
  • 2. CONTENT  Introduction  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches
  • 3. CONTENT  Purpose of Digital Signature  Challenges and Opportunities  Application  Drawbacks  Conclusion
  • 4. INTRODUCTION  The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature.  We have various method to solve this problem, but the use of ‘digital signature’ is definitely the best solution amongst them.  A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the originator of that document uniquely.
  • 5. WHAT IS DIGITAL SIGNATURE  Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document.  Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document.  As the public key of the signer is known, anybody can verify the message and the digital signature.
  • 6. WHY DIGITAL SIGNATURES • To provide Authenticity, Integrity and Non- repudiation to electronic documents • To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 7. BASIC REQUIREMENTS….  Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message.  Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message.
  • 8. BASIC REQUIREMENTS Digital Signature Certificate • A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber. • But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was indeed sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.
  • 10. DIGITAL SIGNATURE ALGORITHM….  Digital Signature Generation
  • 11. DIGITAL SIGNATURE ALGORITHM….  Digital Signature Verification
  • 12. PURPOSE OF DIGITAL SIGNATURE  Signer authentication  Message authentication  Non-repudiation  Integrity
  • 13. CHALLENGES AND OPPORTUNITIES  Institutional overhead: The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions.  Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable.
  • 14. APPLICATIONS ….. Electronic Mail Data storage Electronic funds transfer Software Distribution
  • 15. DRAWBACKS  The private key must be kept in a secured manner.  The process of generation and verification of digital signature requires considerable amount of time.  For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.
  • 16. CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies.