SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Encryption and digitalEncryption and digital
signaturesignature
Encrypting a DocumentEncrypting a Document
 To use a digital signature or encryption youTo use a digital signature or encryption you
must have a digital id also known as a digitalmust have a digital id also known as a digital
certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to
do two things. First, it can be used to do emaildo two things. First, it can be used to do email
encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only
be read by the person they are intended for.be read by the person they are intended for.
Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a
digital signature on a document to guaranteedigital signature on a document to guarantee
that it arrives in the same state it was originallythat it arrives in the same state it was originally
sent and no one has added or changed things.sent and no one has added or changed things.
 A digital id or digital certificate consists ofA digital id or digital certificate consists of
aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared
with everyone. Your private key is kept private.with everyone. Your private key is kept private.
These keys are text documents full of what appearsThese keys are text documents full of what appears
to be random numbers and letters, but with the properto be random numbers and letters, but with the proper
algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very
unique property.unique property.
 If you take a document and run it through an algorithmIf you take a document and run it through an algorithm
with your public key, you get back an encryptedwith your public key, you get back an encrypted
document or an encrypted email.document or an encrypted email.
 Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to
decrypt the document. The process is one way so itdecrypt the document. The process is one way so it
doesn’t matter if other people have the public key,doesn’t matter if other people have the public key,
they can’t read the document.they can’t read the document.
 To decrypt the document you must have the privateTo decrypt the document you must have the private
key. If you give the encrypted document to ankey. If you give the encrypted document to an
algorithm with the private key, you will get back thealgorithm with the private key, you will get back the
original document.original document.
An encrypted document does three things.An encrypted document does three things.
 It guarantees that the document was actually sentIt guarantees that the document was actually sent
by the sender.by the sender.
 It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified
in route.in route.
 It guarantees that no one else can read theIt guarantees that no one else can read the
document.document.
Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and
that it wasn’t modified.that it wasn’t modified.
Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures
 When transferring important documentsWhen transferring important documents
electronically, it is often necessary to certify inelectronically, it is often necessary to certify in
a reliable way who is actually the sendera reliable way who is actually the sender
(author) of a given document. One approach for(author) of a given document. One approach for
certifying the origin of documents and files iscertifying the origin of documents and files is
by using the so-called digital signatureby using the so-called digital signature
(electronic signature).(electronic signature).
 The digital signing of documents uses publicThe digital signing of documents uses public
key cryptography as a mathematical base.key cryptography as a mathematical base.
Creating a digital signatureCreating a digital signature
Extra unit 2

Weitere ähnliche Inhalte

Was ist angesagt?

Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 

Was ist angesagt? (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 

Andere mochten auch

Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentation
pathsproject
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsa
designforchangechallenge
 

Andere mochten auch (11)

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
 
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
Exchange 2013 coexistence environment and the Exchange legacy infrastructure ...
 
Comparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentationComparing taxonomies for organising collections of documents presentation
Comparing taxonomies for organising collections of documents presentation
 
TAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS PandiapuramTAM-2012-11 PUMS Pandiapuram
TAM-2012-11 PUMS Pandiapuram
 
IND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading LiteracyIND-2012-286 Loreto School Education - Spreading Literacy
IND-2012-286 Loreto School Education - Spreading Literacy
 
Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015Boletim informativo novembro/dezembro 2015
Boletim informativo novembro/dezembro 2015
 
Ana clara
Ana claraAna clara
Ana clara
 
IND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden HourIND-2012-299 Alok Bharati Public School -Golden Hour
IND-2012-299 Alok Bharati Public School -Golden Hour
 
Санкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мираСанкт-Петербургский консенсус. Новая экономическая политика для мира
Санкт-Петербургский консенсус. Новая экономическая политика для мира
 
Rasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsaRasikbhau dhariwal highschool, ganegaon khalsa
Rasikbhau dhariwal highschool, ganegaon khalsa
 
Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...Outlook autodiscover decision process choosing the right autodiscover method ...
Outlook autodiscover decision process choosing the right autodiscover method ...
 

Ähnlich wie Extra unit 2

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
Dhaval Bhatia
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
ManuE45
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 

Ähnlich wie Extra unit 2 (20)

D.Silpa
D.SilpaD.Silpa
D.Silpa
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Ds over
Ds overDs over
Ds over
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Digital signature
Digital signatureDigital signature
Digital signature
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 

Mehr von Sheetal Verma (10)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Unit 4
Unit 4Unit 4
Unit 4
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Extra unit 2

  • 1. Encryption and digitalEncryption and digital signaturesignature
  • 2. Encrypting a DocumentEncrypting a Document  To use a digital signature or encryption youTo use a digital signature or encryption you must have a digital id also known as a digitalmust have a digital id also known as a digital certificate. A digital id/digital certificate used tocertificate. A digital id/digital certificate used to do two things. First, it can be used to do emaildo two things. First, it can be used to do email encryption or encrypt files so that they can onlyencryption or encrypt files so that they can only be read by the person they are intended for.be read by the person they are intended for. Second, it can be used to “sign” or place aSecond, it can be used to “sign” or place a digital signature on a document to guaranteedigital signature on a document to guarantee that it arrives in the same state it was originallythat it arrives in the same state it was originally sent and no one has added or changed things.sent and no one has added or changed things.
  • 3.  A digital id or digital certificate consists ofA digital id or digital certificate consists of aa publicpublic andand privateprivate key. Your public key is sharedkey. Your public key is shared with everyone. Your private key is kept private.with everyone. Your private key is kept private. These keys are text documents full of what appearsThese keys are text documents full of what appears to be random numbers and letters, but with the properto be random numbers and letters, but with the proper algorithm, these numbers and letters have a veryalgorithm, these numbers and letters have a very unique property.unique property.  If you take a document and run it through an algorithmIf you take a document and run it through an algorithm with your public key, you get back an encryptedwith your public key, you get back an encrypted document or an encrypted email.document or an encrypted email.
  • 4.  Once it is encrypted, the public key can’t be used toOnce it is encrypted, the public key can’t be used to decrypt the document. The process is one way so itdecrypt the document. The process is one way so it doesn’t matter if other people have the public key,doesn’t matter if other people have the public key, they can’t read the document.they can’t read the document.  To decrypt the document you must have the privateTo decrypt the document you must have the private key. If you give the encrypted document to ankey. If you give the encrypted document to an algorithm with the private key, you will get back thealgorithm with the private key, you will get back the original document.original document.
  • 5. An encrypted document does three things.An encrypted document does three things.  It guarantees that the document was actually sentIt guarantees that the document was actually sent by the sender.by the sender.  It guarantees that the document wasn’t modifiedIt guarantees that the document wasn’t modified in route.in route.  It guarantees that no one else can read theIt guarantees that no one else can read the document.document. Digital signature on it guarantees who sent it andDigital signature on it guarantees who sent it and that it wasn’t modified.that it wasn’t modified.
  • 6. Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures  When transferring important documentsWhen transferring important documents electronically, it is often necessary to certify inelectronically, it is often necessary to certify in a reliable way who is actually the sendera reliable way who is actually the sender (author) of a given document. One approach for(author) of a given document. One approach for certifying the origin of documents and files iscertifying the origin of documents and files is by using the so-called digital signatureby using the so-called digital signature (electronic signature).(electronic signature).  The digital signing of documents uses publicThe digital signing of documents uses public key cryptography as a mathematical base.key cryptography as a mathematical base.
  • 7. Creating a digital signatureCreating a digital signature