SlideShare a Scribd company logo
1 of 22
Digital Certificates
         &
Digital signatures
What is a digital signature ?
• A digital signature is a mathematical scheme for
  demonstrating the authenticity of a digital message or
  document.
• A valid digital signature gives a recipient reason to
  believe that the message was created by a known
  sender, and that it was not altered in transit.
• Digital signatures are commonly used for software
  distribution, financial transactions, and in other cases
  where it is important to detect forgery or tampering.
INTRODUCTION
• Digital signatures employ a type of asymmetric
  cryptography.
• For messages sent through a nonsecure channel, a
  properly implemented digital signature gives the
  receiver reason to believe the message was sent by
  the claimed sender.
• Digital signature schemes in the sense used here are
  cryptographically based, and must be implemented
  properly to be effective.
• Digitally signed messages may be anything
  representable as a bitstring: examples include
  electronic mail, contracts, or a message sent via some
  other cryptographic protocol
• A digital signature scheme typically consists of three
  algorithms:
• A key generation algorithm that selects a private key
  uniformly at random from a set of possible private
  keys. The algorithm outputs the private key and a
  corresponding public key.
• A signing algorithm that, given a message and a
  private key, produces a signature.
• A signature verifying algorithm that, given a
  message, public key and a signature, either accepts or
  rejects the message's claim to authenticity.

• Two main properties are required. First, a signature
  generated from a fixed message and fixed private key
  should verify the authenticity of that message by
  using the corresponding public key. Secondly, it
  should be computationally infeasible to generate a
  valid signature for a party who does not possess the
  private key.
Uses of Digital Signatures
• Now a days, organisations are moving away
  from paper documents with ink signatures or
  authenticity stamps, to digital signatures.

• It can provide added assurances of the evidence to
  provenance, identity, and status of an electronic
  document as well as acknowledging consent and
  approval by a signatory.
• Below are some common reasons for applying a
  digital signature to communications.

• Authentication:-
  - Digital signatures can be used to authenticate the
  source of messages.
  -For example, suppose a bank's branch office sends
  instructions to the central office requesting a change
  in the balance of an account.

• Integrity:-
  ▫ The sender and receiver of a message must know
    that the message has not been altered during
    transmission.
• However, if a message is digitally signed, any change
  in the message after signature will invalidate the
  signature.

• Non-repudiation:-
  ▫ An entity that has signed some information cannot
    at a later time deny having signed it. Similarly,
    access to the public key only does not enable a
    fraudulent party to fake a valid sign
Additional Security Precautions
• Using smart card readers with a separate
  keyboard:-
  ▫ Some card readers have their own numeric
    keypad. This is safer than using a card reader
    integrated into a PC, and then entering the PIN
    using that computer's keyboard.
• Using digital signatures only with trusted
  applications:-
      One of the main differences between a digital
  signature and a written signature is that the user does
  not "see" what he signs.
WYSIWYS
• WYSIWYS is an shortform for What You See Is
  What You Sign, used to describe the property of
  digital signatures systems that the content of signed
  messages can not be changed, either by accident or
  intent.
• What You See Is What You Sign means that the
  semantic interpretation of a signed message cannot be
  changed.
Digital signatures vs. ink on paper signatures

• Ink Paper Signatures     • Digital Signatures
• An ink signature could   • Digital signatures bind
  be replicated from one     an electronic identity to
  document to another by     an electronic document
  copying the image          and the digital signature
  manually or digitally.     cannot be copied to
                             another document.
• Ink Signatures can be    • Digital signatures can
  easilly erasiable.         never be erased.
What is Private Key & Public Key ???

• Cryptographic system requiring two separate Keys,
  one to lock or encrypt the Plaintext, and one to
  unlock or decrypt the Cyber text.
• One of these keys is published or public and the
  other is kept private.
• a private key, which only you use. and
• a public key, which other people use.
Example:       (B's public key)




           B
               (B's private key)
B’s Co-workers




                                                               Z
            X                       Y



 B’s Public Key

 Anyone can get B's Public Key, but B keeps his Private Key to himself
"Hey B, how   HNFmsEm6Un
     are you ?”    BejhhyCGKOK



Z




    HNFmsEm6U
    n              "Hey B, how
    BejhhyCGKOB    are you ?”
    cyLK


B
Bob Info:
  Name
  Department
  Cubical Number
Certificate Info:
  Expiration Date
  Serial Number
Bob's Public Key:




                    B’s Co-Worker
Why we use digital signature?
• Guarantees that the person who sent the message is
  really the one who sent it.

• By placing the digital signature on a document proves
  not only the document is for real, but it also shows
  that the signature is not fake or forgery.

• insures data Integrity giving the user piece of mind
  that the message or transaction has not been
  accidentally or maliciously altered.
• ensures confidentiality and ensures that messages can
  only be read by authorized intended recipients.

• also verifies date and time so that senders or
  recipients can not dispute if the message was actually
  sent or received.
• The process of checking the validity of digital
  signature.

• Advantages
  1) Imposter Prevention
  2) Message Integrity
  3) Legal Requirement

More Related Content

What's hot

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
ravijain90
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

What's hot (20)

Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Viewers also liked

Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signatures
phanleson
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
Netri Chowdhary
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
PSPCL
 

Viewers also liked (11)

Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signatures
 
Twitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter todayTwitter Today 2015 - How brand should use Twitter today
Twitter Today 2015 - How brand should use Twitter today
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
SSLCertificate101
SSLCertificate101SSLCertificate101
SSLCertificate101
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Introduction to Apache Spark
Introduction to Apache SparkIntroduction to Apache Spark
Introduction to Apache Spark
 

Similar to Digital certificates

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 

Similar to Digital certificates (20)

E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptxIntroduction to DIGITAL SIGNATURE in Cryptography.pptx
Introduction to DIGITAL SIGNATURE in Cryptography.pptx
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptxDIGITAL SIGNATURE PPT.pptx
DIGITAL SIGNATURE PPT.pptx
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Cryptography
CryptographyCryptography
Cryptography
 
Genia Solution
Genia SolutionGenia Solution
Genia Solution
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Digital certificates

  • 1. Digital Certificates & Digital signatures
  • 2. What is a digital signature ? • A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. • A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. • Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
  • 3. INTRODUCTION • Digital signatures employ a type of asymmetric cryptography. • For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. • Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective.
  • 4. • Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol • A digital signature scheme typically consists of three algorithms: • A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. • A signing algorithm that, given a message and a private key, produces a signature.
  • 5. • A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity. • Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.
  • 6.
  • 7. Uses of Digital Signatures • Now a days, organisations are moving away from paper documents with ink signatures or authenticity stamps, to digital signatures. • It can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging consent and approval by a signatory.
  • 8. • Below are some common reasons for applying a digital signature to communications. • Authentication:- - Digital signatures can be used to authenticate the source of messages. -For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. • Integrity:- ▫ The sender and receiver of a message must know that the message has not been altered during transmission.
  • 9. • However, if a message is digitally signed, any change in the message after signature will invalidate the signature. • Non-repudiation:- ▫ An entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid sign
  • 10. Additional Security Precautions • Using smart card readers with a separate keyboard:- ▫ Some card readers have their own numeric keypad. This is safer than using a card reader integrated into a PC, and then entering the PIN using that computer's keyboard. • Using digital signatures only with trusted applications:- One of the main differences between a digital signature and a written signature is that the user does not "see" what he signs.
  • 11. WYSIWYS • WYSIWYS is an shortform for What You See Is What You Sign, used to describe the property of digital signatures systems that the content of signed messages can not be changed, either by accident or intent. • What You See Is What You Sign means that the semantic interpretation of a signed message cannot be changed.
  • 12. Digital signatures vs. ink on paper signatures • Ink Paper Signatures • Digital Signatures • An ink signature could • Digital signatures bind be replicated from one an electronic identity to document to another by an electronic document copying the image and the digital signature manually or digitally. cannot be copied to another document. • Ink Signatures can be • Digital signatures can easilly erasiable. never be erased.
  • 13. What is Private Key & Public Key ??? • Cryptographic system requiring two separate Keys, one to lock or encrypt the Plaintext, and one to unlock or decrypt the Cyber text. • One of these keys is published or public and the other is kept private. • a private key, which only you use. and • a public key, which other people use.
  • 14. Example: (B's public key) B (B's private key)
  • 15. B’s Co-workers Z X Y B’s Public Key Anyone can get B's Public Key, but B keeps his Private Key to himself
  • 16. "Hey B, how HNFmsEm6Un are you ?” BejhhyCGKOK Z HNFmsEm6U n "Hey B, how BejhhyCGKOB are you ?” cyLK B
  • 17.
  • 18.
  • 19. Bob Info: Name Department Cubical Number Certificate Info: Expiration Date Serial Number Bob's Public Key: B’s Co-Worker
  • 20. Why we use digital signature? • Guarantees that the person who sent the message is really the one who sent it. • By placing the digital signature on a document proves not only the document is for real, but it also shows that the signature is not fake or forgery. • insures data Integrity giving the user piece of mind that the message or transaction has not been accidentally or maliciously altered.
  • 21. • ensures confidentiality and ensures that messages can only be read by authorized intended recipients. • also verifies date and time so that senders or recipients can not dispute if the message was actually sent or received.
  • 22. • The process of checking the validity of digital signature. • Advantages 1) Imposter Prevention 2) Message Integrity 3) Legal Requirement