SlideShare ist ein Scribd-Unternehmen logo
Information
Security
Asymmetric
Cryptography
&
Digital Signature
Asymmetric Cryptography
• Asymmetric encryption, also known as public-key
cryptography, is a type of encryption that uses a pair of
keys to encrypt and decrypt data.
• The pair of keys includes a public key, which can be shared
with anyone, and a private key, which is kept secret by the
Owner.
• The sender uses the recipient’s public key to encrypt the
data. The recipient then uses their private key to decrypt
the data.
Add a footer 2
• Alice composes and encrypts an email for Bob using Bob’s public key. She
follows up by sending Bob the encrypted email. After receiving the email, Bob
uses his private key to decrypt it so that it may be read.
• As a result, Alice can communicate Bob securely without being concerned that
the message’s content will be viewed by someone else.
Example of Asymmetric Encryption
Add a footer 3
• Dual Keys
• Encryption and Decryption
• Digital Signatures
• Secure Key Exchange
• Security
Main Features of Asymmetric
Encryption
Add a footer 4
Dual Key:
Asymmetric encryption uses a pair of keys, including a public key and a private key.
The public key can be freely shared with anyone, while the private key is kept secret
and known only to the key owner.
Encryption and decryption:
Asymmetric encryption uses the public key to encrypt data and the private key to
decrypt data. This allows secure communication between two parties without the
need to exchange secret keys.
Digital signatures:
Asymmetric encryption enables the creation of digital signatures, which can be used
to verify the authenticity of data. A digital signature is created by encrypting a hash of
the data with the sender’s private key.
Secure key exchange
Asymmetric encryption allows for secure key exchange, which is a critical feature in
secure communication. For example, the Diffie-Hellman key exchange algorithm uses
asymmetric encryption to establish a shared secret key between two parties without
exchanging the key itself.
Security:
Asymmetric encryption is considered more secure than symmetric encryption because it
eliminates the need to exchange secret keys, which can be a security risk.
Additionally, the private key is kept secret, which makes it harder for attackers to
intercept or tamper with the data.
Digital Signatures
• A digital signature is a mathematical technique used to validate the authenticity
and integrity of a message, software, or digital document.
• Digital signatures can provide evidence of origin, identity and status of electronic
documents, transactions or digital messages.
Digital Signature
Add a footer 8
• Digital signatures are based on public key cryptography, also known as asymmetric
cryptography. Using a public key algorithm -- such as RSA -- two keys are generated,
creating a mathematically linked pair of keys: one private and one public.
• As a result, Alice can communicate Bob securely without being concerned that the
message’s content will be viewed by someone else.
How do digital signatures work?
Add a footer 9
• Digital signatures work through public key cryptography's two mutually
authenticating cryptographic keys. For encryption and decryption, the person who
creates the digital signature uses a private key to encrypt signature-related data.
The only way to decrypt that data is with the signer's public key.
• If the recipient can't open the document with the signer's public key, that
indicates there's a problem with the document or the signature. This is how digital
signatures are authenticated.
How do digital signatures work?
Add a footer 10
Financial Documents:
Finance departments digitally sign invoices so customers can trust that the payment
request is from the right seller, not from a bad actor trying to trick the buyer into
sending payments to a fraudulent account.
Health Data:
In the healthcare industry, privacy is paramount for both patient records and research
data. Digital signatures ensure that this confidential information was not modified
when it was transmitted between the consenting parties.
Benefits of Digital Signatures
Add a footer 11
Legal documents and contracts:
Digital signatures are legally binding. This makes them ideal for any legal document
that requires a signature authenticated by one or more parties and guarantees that
the record has not been altered.
Sales contracts:
Digital signing of contracts and sales contracts authenticates the identity of the seller
and the buyer, and both parties can be sure that the signatures are legally binding and
that the terms of the agreement have not been changed.
Benefits of Digital Signatures
Add a footer 12
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Asymmetric Cryptography digital sig.pptx

Digital signature
Digital signatureDigital signature
Digital signature
gajerachetan
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
Dr. Mazin Mohamed alkathiri
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
ravik09783
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
Sindhu Nathan
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
AboutSSL
 
Ds over
Ds overDs over
Ds over
jolly9293
 

Ähnlich wie Asymmetric Cryptography digital sig.pptx (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Ds over
Ds overDs over
Ds over
 

Kürzlich hochgeladen

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Kürzlich hochgeladen (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Asymmetric Cryptography digital sig.pptx

  • 2. Asymmetric Cryptography • Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data. • The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the Owner. • The sender uses the recipient’s public key to encrypt the data. The recipient then uses their private key to decrypt the data. Add a footer 2
  • 3. • Alice composes and encrypts an email for Bob using Bob’s public key. She follows up by sending Bob the encrypted email. After receiving the email, Bob uses his private key to decrypt it so that it may be read. • As a result, Alice can communicate Bob securely without being concerned that the message’s content will be viewed by someone else. Example of Asymmetric Encryption Add a footer 3
  • 4. • Dual Keys • Encryption and Decryption • Digital Signatures • Secure Key Exchange • Security Main Features of Asymmetric Encryption Add a footer 4
  • 5. Dual Key: Asymmetric encryption uses a pair of keys, including a public key and a private key. The public key can be freely shared with anyone, while the private key is kept secret and known only to the key owner. Encryption and decryption: Asymmetric encryption uses the public key to encrypt data and the private key to decrypt data. This allows secure communication between two parties without the need to exchange secret keys. Digital signatures: Asymmetric encryption enables the creation of digital signatures, which can be used to verify the authenticity of data. A digital signature is created by encrypting a hash of the data with the sender’s private key.
  • 6. Secure key exchange Asymmetric encryption allows for secure key exchange, which is a critical feature in secure communication. For example, the Diffie-Hellman key exchange algorithm uses asymmetric encryption to establish a shared secret key between two parties without exchanging the key itself. Security: Asymmetric encryption is considered more secure than symmetric encryption because it eliminates the need to exchange secret keys, which can be a security risk. Additionally, the private key is kept secret, which makes it harder for attackers to intercept or tamper with the data.
  • 8. • A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. • Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. Digital Signature Add a footer 8
  • 9. • Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm -- such as RSA -- two keys are generated, creating a mathematically linked pair of keys: one private and one public. • As a result, Alice can communicate Bob securely without being concerned that the message’s content will be viewed by someone else. How do digital signatures work? Add a footer 9
  • 10. • Digital signatures work through public key cryptography's two mutually authenticating cryptographic keys. For encryption and decryption, the person who creates the digital signature uses a private key to encrypt signature-related data. The only way to decrypt that data is with the signer's public key. • If the recipient can't open the document with the signer's public key, that indicates there's a problem with the document or the signature. This is how digital signatures are authenticated. How do digital signatures work? Add a footer 10
  • 11. Financial Documents: Finance departments digitally sign invoices so customers can trust that the payment request is from the right seller, not from a bad actor trying to trick the buyer into sending payments to a fraudulent account. Health Data: In the healthcare industry, privacy is paramount for both patient records and research data. Digital signatures ensure that this confidential information was not modified when it was transmitted between the consenting parties. Benefits of Digital Signatures Add a footer 11
  • 12. Legal documents and contracts: Digital signatures are legally binding. This makes them ideal for any legal document that requires a signature authenticated by one or more parties and guarantees that the record has not been altered. Sales contracts: Digital signing of contracts and sales contracts authenticates the identity of the seller and the buyer, and both parties can be sure that the signatures are legally binding and that the terms of the agreement have not been changed. Benefits of Digital Signatures Add a footer 12