SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Seminar
on
Digital Signature
Prepared By: Jinkal Patel
Enrollment No: 140580702005
Guide By : Prof. Ramesh Prajapati
Saraswati College of Engineering Gujarat Technological University
& Technology
Content
• Introduction
• What is Digital Signature???
• Why Digital Signature???
• Basic Requirements….
• How the Technology Works
• Approaches
• Algorithm of Digital Signature
• Challenges and Opportunities
• Application
• Drawbacks
• Conclusion
INTRODUCTION
The authenticity of many legal, financial, and other documents is
done by the presence or absence of an authorized handwritten
signature.
“Digital Signature” is the best solution for authenticity in various
fields.
A digital signature is nothing but an attachment to any piece of
electronic information, which represents the content of the
document and the identity of the owner of that document
uniquely[5].
What is digital signature
Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document.
Digital Signature of a person therefore varies from document to
document thus ensuring authenticity of each word of that document.
As the public key of the signer is known, anybody can verify the
message and the digital signature.
Why Digital Signatures???
To provide Authenticity, Integrity and Non-repudiation to electronic
documents.
To use the Internet as the safe and secure medium for e-Commerce
and e-Governance
BASIC REQUIREMENTS….
Private Key
The private key is one which is accessible only to the signer. It is
used to generate the digital signature which is then attached to the
message.[2]
Public Key
The public key is made available to all those who receive the signed
messages from the sender. It is used for verification of the received
message.[2]
BASIC REQUIREMENTS…
 Digital Signature Certificate
A subscriber of the private key and public key pair makes the public
key available to all those who are intended to receive the signed
messages from the subscriber.[1]
 But in case of any dispute between the two sides, there must be some
entity with the receiver which will allow the receiver of the message
to prove that the message was sent by the subscriber of the key pair.
This can be done with the Digital Signature Certificate.[1]
HOW THE TECHNOLOGY WORKS??
DIGITAL SIGNATURE ALGORITHM
Digital Signature Generation
DIGITAL SIGNATURE ALGORITHM
 Digital Signature Verification
DIGITAL SIGNATURE ALGORITHM
Secure Hash Algorithm
Digital Signatures
I agree
Efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
 These are digital signatures of same person on different documents
Paper Signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature
independent of the
document
Signature depends on the contents of the document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer user
b. Error free
Challenges and Opportunities
 Institutional overhead:
The cost of establishing and utilizing certification authorities,
repositories, and other important services, as well as assuring
quality in the performance of their functions.
Subscriber and Relying Party Costs:
A digital signer will require software, and will probably have to
pay a certification authority some price to issue a certificate.
Hardware to secure the subscriber's private key may also be
advisable.
APPLICATIONS …..
 Electronic Mail
 Data storage
 Electronic funds transfer
 Software Distribution
 Smart Cards
 MITRENET
 ISDN
 Time Stamped Signature
 Blind Signatures
DRAWBACKS
The private key must be kept in a secured manner.[3]
The process of generation and verification of digital signature
requires considerable amount of time.[3]
For using the digital signature the user has to obtain private and
public key, the receiver has to obtain the digital signature certificate
also.[3]
CONCLUSION
Digital signatures are difficult to understand. Digital
signatures will be championed by many players that the
public distrusts, including national security agencies, law
enforcement agencies, and consumer marketing
companies.
References
1. https://en.m.wikipedia.org/wiki/Digital_Signature
2. www.google.com
3. www.computerfun4u.blogspot.com
4. www.slideshare.net
5. Cryptography & Network Security : Principal & Practise ,William Stallings
Thanks…!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System VisualBee.com
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 

Was ist angesagt? (20)

Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 

Andere mochten auch

Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Information theory
Information theoryInformation theory
Information theoryroger Pitiot
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchangehughpearse
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

Andere mochten auch (6)

Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
 
Information theory
Information theoryInformation theory
Information theory
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Ähnlich wie Seminar ppt on digital signature

csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Digital signature
Digital signatureDigital signature
Digital signatureJanani S
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in KolkataDigitalSignatureOnli
 

Ähnlich wie Seminar ppt on digital signature (20)

csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 

Kürzlich hochgeladen

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 

Kürzlich hochgeladen (20)

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 

Seminar ppt on digital signature

  • 1. Seminar on Digital Signature Prepared By: Jinkal Patel Enrollment No: 140580702005 Guide By : Prof. Ramesh Prajapati Saraswati College of Engineering Gujarat Technological University & Technology
  • 2. Content • Introduction • What is Digital Signature??? • Why Digital Signature??? • Basic Requirements…. • How the Technology Works • Approaches • Algorithm of Digital Signature • Challenges and Opportunities • Application • Drawbacks • Conclusion
  • 3. INTRODUCTION The authenticity of many legal, financial, and other documents is done by the presence or absence of an authorized handwritten signature. “Digital Signature” is the best solution for authenticity in various fields. A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the owner of that document uniquely[5].
  • 4. What is digital signature Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document. Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature.
  • 5. Why Digital Signatures??? To provide Authenticity, Integrity and Non-repudiation to electronic documents. To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 6. BASIC REQUIREMENTS…. Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message.[2] Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message.[2]
  • 7. BASIC REQUIREMENTS…  Digital Signature Certificate A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber.[1]  But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.[1]
  • 10. DIGITAL SIGNATURE ALGORITHM  Digital Signature Verification
  • 12. Digital Signatures I agree Efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3  These are digital signatures of same person on different documents
  • 13. Paper Signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 14. Challenges and Opportunities  Institutional overhead: The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions. Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable.
  • 15. APPLICATIONS …..  Electronic Mail  Data storage  Electronic funds transfer  Software Distribution  Smart Cards  MITRENET  ISDN  Time Stamped Signature  Blind Signatures
  • 16. DRAWBACKS The private key must be kept in a secured manner.[3] The process of generation and verification of digital signature requires considerable amount of time.[3] For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.[3]
  • 17. CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies.
  • 18. References 1. https://en.m.wikipedia.org/wiki/Digital_Signature 2. www.google.com 3. www.computerfun4u.blogspot.com 4. www.slideshare.net 5. Cryptography & Network Security : Principal & Practise ,William Stallings