SlideShare a Scribd company logo
1 of 14
A
Colloquium
On
DIGITAL SIGNATURE
Submitted By:
PRASHANT SHEKHAR
Roll No.1573713024
Under the supervision of:
MISS. ANAMIKA SHRIVATSVA
Department of Information Technology
Rajkiya Engineering College, Ambedkar Nagar (UP)-224122
Submitted to:
MISS. ANAMIKA SHRIVATSVA
CONTENTS
Introduction
Motivation
How does it work?
Application
Advantages
Disadvantages
Conclusion
Reference
2
INTRODUCTION
A digital signature is a mathematical scheme that is used to
authenticate the sender of an electronic document .
A digital signature is nothing but an attachment to any
piece of electronic information, which represents the
content of the document and the identity of the owner of
that document uniquely
3
4
Motivation
To provide Authenticity, Integrity and Non-repudiation to electronic
documents.
To use the Internet as the safe and secure medium for e-Commerce
and e-Governance
Basic requirements
Private Key
The private key is one which is accessible only to the
signer. It is used to generate the digital signature which is
then attached to the message.
Public Key
The public key is made available to all those who receive
the signed messages from the sender. It is used for
verification of the received message
5
Digital certificate
A subscriber of the private key and public key pair makes
the public key available to all those who are intended to
receive the signed messages from the subscriber.[1]
But in case of any dispute between the two sides, there
must be some entity with the receiver which will allow the
receiver of the message to prove that the message was sent
by the subscriber of the key pair. This can be done with the
Digital Signature Certificate.[1]
6
7
Digital signature algo
How does it work?
Application
Electronic Mail
Data storage
Electronic funds transfer
Software Distribution
Smart Cards
ISDN
Time Stamped Signature
Blind Signatures
9
Authentication: Identification of the person that signs.
Integrity of data: Every change will be detected.
Non repudiation: Because the author cannot
be denied of his work (he created and sent).
Imposter prevention: Elimination of possibility of committing
fraud by an imposter
Advantages
Expiry: In this era of fast technological advancements, many of
these tech products have a short shelf life.
Certificates: In order to effectively use digital signatures, both
senders and recipients may have to buy digital certificates.
Software: To work with digital certificates, senders and recipients
have to buy verification software at a cost.
Disadvantages
CONCLUSION
Digital signatures are difficult to understand. Digital
signatures will be championed by many players that the
public distrusts, including national security agencies, law
enforcement agencies, and consumer marketing
companies.
12
References
 http://en.wikipedia.org/wiki/
 Applied Cryptography by Bruce Schneider; 10th
Anniversary edition
 FIPS PUB 186-3; FEDERAL INFORMATION PROCESSING
STANDARDS PUBLICATION
14

More Related Content

What's hot (20)

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Cyber law
Cyber lawCyber law
Cyber law
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signaturePSPCL
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...Olou Luc
 
Digital signature
Digital signatureDigital signature
Digital signatureYug Sharma
 
Digital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskDigital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskChunJia Sio
 
Google Partners - Adwords
Google Partners - AdwordsGoogle Partners - Adwords
Google Partners - Adwordsjohnbrito123
 
Podpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiePodpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiepodpisani .pl
 
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...Arathi Jayaprakash
 
HPC Application Profiling & Analysis
HPC Application Profiling & AnalysisHPC Application Profiling & Analysis
HPC Application Profiling & AnalysisRishi Pathak
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overviewRishi Pathak
 

Viewers also liked (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...
EVALUATING THE EFFECT OF SWITCHING BARRIERS ON SUBSCRIBER RETENTION IN THE GH...
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage riskDigital signature efficient, cut cost and manage risk
Digital signature efficient, cut cost and manage risk
 
CMS digital signature
CMS digital signatureCMS digital signature
CMS digital signature
 
Google Partners - Adwords
Google Partners - AdwordsGoogle Partners - Adwords
Google Partners - Adwords
 
Podpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesiePodpis elektroniczny i jego zastosowanie w biznesie
Podpis elektroniczny i jego zastosowanie w biznesie
 
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
 
Conclusion
ConclusionConclusion
Conclusion
 
HPC Application Profiling & Analysis
HPC Application Profiling & AnalysisHPC Application Profiling & Analysis
HPC Application Profiling & Analysis
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 

Similar to Digital Signature

seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfMehediHasanShaon1
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Process to obtain Digital Signature with explanations of classes of DS
Process to obtain Digital Signature with explanations of classes of DSProcess to obtain Digital Signature with explanations of classes of DS
Process to obtain Digital Signature with explanations of classes of DSJYOTI SINGH
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 

Similar to Digital Signature (20)

Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
seminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdfseminar-151029231027-lva1-app6892.pdf
seminar-151029231027-lva1-app6892.pdf
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Process to obtain Digital Signature with explanations of classes of DS
Process to obtain Digital Signature with explanations of classes of DSProcess to obtain Digital Signature with explanations of classes of DS
Process to obtain Digital Signature with explanations of classes of DS
 
E-Business security
E-Business security E-Business security
E-Business security
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 

More from Adarsh Kumar Yadav (17)

Adarsh kumar yadav
Adarsh kumar yadavAdarsh kumar yadav
Adarsh kumar yadav
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 
X INTERNET
X INTERNETX INTERNET
X INTERNET
 
E.P.R. (ENTERPRISE RESOURCE PLANNING)
E.P.R. (ENTERPRISE RESOURCE PLANNING)E.P.R. (ENTERPRISE RESOURCE PLANNING)
E.P.R. (ENTERPRISE RESOURCE PLANNING)
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
 
G.P.S. (global positioning system)
G.P.S. (global positioning system)G.P.S. (global positioning system)
G.P.S. (global positioning system)
 
blu ray disc
blu ray discblu ray disc
blu ray disc
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Voice browser
Voice browserVoice browser
Voice browser
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
Torrent
TorrentTorrent
Torrent
 
SPCS presentation
SPCS  presentation SPCS  presentation
SPCS presentation
 
presentation on 4g technology
presentation on 4g technologypresentation on 4g technology
presentation on 4g technology
 
Search engine
Search engineSearch engine
Search engine
 
Brainfingerprinting
Brainfingerprinting Brainfingerprinting
Brainfingerprinting
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 
Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices Computer peripheral or Peripheral Devices
Computer peripheral or Peripheral Devices
 

Recently uploaded

Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Recently uploaded (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Digital Signature

  • 1. A Colloquium On DIGITAL SIGNATURE Submitted By: PRASHANT SHEKHAR Roll No.1573713024 Under the supervision of: MISS. ANAMIKA SHRIVATSVA Department of Information Technology Rajkiya Engineering College, Ambedkar Nagar (UP)-224122 Submitted to: MISS. ANAMIKA SHRIVATSVA
  • 2. CONTENTS Introduction Motivation How does it work? Application Advantages Disadvantages Conclusion Reference 2
  • 3. INTRODUCTION A digital signature is a mathematical scheme that is used to authenticate the sender of an electronic document . A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the owner of that document uniquely 3
  • 4. 4 Motivation To provide Authenticity, Integrity and Non-repudiation to electronic documents. To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 5. Basic requirements Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message. Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message 5
  • 6. Digital certificate A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber.[1] But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.[1] 6
  • 8. How does it work?
  • 9. Application Electronic Mail Data storage Electronic funds transfer Software Distribution Smart Cards ISDN Time Stamped Signature Blind Signatures 9
  • 10. Authentication: Identification of the person that signs. Integrity of data: Every change will be detected. Non repudiation: Because the author cannot be denied of his work (he created and sent). Imposter prevention: Elimination of possibility of committing fraud by an imposter Advantages
  • 11. Expiry: In this era of fast technological advancements, many of these tech products have a short shelf life. Certificates: In order to effectively use digital signatures, both senders and recipients may have to buy digital certificates. Software: To work with digital certificates, senders and recipients have to buy verification software at a cost. Disadvantages
  • 12. CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies. 12
  • 13. References  http://en.wikipedia.org/wiki/  Applied Cryptography by Bruce Schneider; 10th Anniversary edition  FIPS PUB 186-3; FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION
  • 14. 14