digital signature

14
A Colloquium On DIGITAL SIGNATURE Submitted By: PRASHANT SHEKHAR Roll No.1573713024 Under the supervision of: MISS. ANAMIKA SHRIVATSVA Department of Information Technology Rajkiya Engineering College, Ambedkar Nagar (UP)-224122 Submitted to: MISS. ANAMIKA SHRIVATSVA

Upload: adarsh-kumar-yadav

Post on 07-Apr-2017

51 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Digital Signature

A Colloquium

On

DIGITAL SIGNATURE

Submitted By:PRASHANT SHEKHAR Roll No.1573713024

Under the supervision of:MISS. ANAMIKA SHRIVATSVA

Department of Information TechnologyRajkiya Engineering College, Ambedkar Nagar (UP)-224122

Submitted to:MISS. ANAMIKA SHRIVATSVA

Page 2: Digital Signature

CONTENTSIntroductionMotivation How does it work?ApplicationAdvantages DisadvantagesConclusionReference

2

Page 3: Digital Signature

INTRODUCTION A digital signature is a mathematical scheme that

is used to authenticate the sender of an electronic document .

A digital signature is nothing but an attachment to , any piece of electronic information which

represents the content of the document and the identity of the owner of that document uniquely

3

Page 4: Digital Signature

4

Motivation

To provide Authenticity, Integrity and Non-repudiation to electronic documents.

To use the Internet as the safe and secure medium for e-Commerce and e-Governance

Page 5: Digital Signature

Basic requirementsPrivate Key The private key is one which is accessible only to the

signer. It is used to generate the digital signature which is then attached to the message.

Public Key The public key is made available to all those who receive

the signed messages from the sender. It is used for verification of the received message

5

Page 6: Digital Signature

Digital certificateA subscriber of the private key and public key pair makes

the public key available to all those who are intended to receive the signed messages from the subscriber.[1]

But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.[1]

6

Page 7: Digital Signature

7

Digital signature algo

Page 8: Digital Signature

How does it work?

Page 9: Digital Signature

Application

Electronic MailData storageElectronic funds transferSoftware DistributionSmart Cards ISDNTime Stamped SignatureBlind Signatures

9

Page 10: Digital Signature

Authentication: Identification of the person that signs.

Integrity of data: Every change will be detected.

Non repudiation: Because the author cannot be denied of his work (he created and sent).

Imposter prevention: Elimination of possibility of committing fraud by an imposter

Advantages

Page 11: Digital Signature

Expiry: In this era of fast technological advancements, many of these tech products have a short shelf life.

Certificates: In order to effectively use digital signatures, both senders and recipients may have to buy digital certificates.

Software: To work with digital certificates, senders and recipients have to buy verification software at a cost.

Disadvantages

Page 12: Digital Signature

CONCLUSION

. Digital signatures are difficult to understand Digital signatures will be championed by many , players that the public distrusts including , national security agencies law enforcement, .agencies and consumer marketing companies

12

Page 13: Digital Signature

References

http://en.wikipedia.org/wiki/ Applied Cryptography by Bruce Schneider; 10th Anniversary

edition FIPS PUB 186-3; FEDERAL INFORMATION PROCESSING

STANDARDS PUBLICATION

Page 14: Digital Signature

14