SlideShare une entreprise Scribd logo
1  sur  19
Digital Signature
Mohamed Talaat
1
Agenda
• What is Digital Signature?
• How DS work?
• General Framework of DS
• Key Requirements
• Private Key Protection
• Benefits of Digital Signature
• Drawbacks of Digital Signature
• Applications
2
3
Symmetric Key Cryptography
4
Asymmetric Key Cryptography
5
What is Digital Signature?
• Digital Signature is a type of asymmetric
cryptography used to simulate the security properties
of a signature in digital, rather than written, form.
• Digital Signature is an electronic signature that can
be used to authenticate the identity of the sender of a
message or the signer of a document, and possibly to
ensure that the original content of the message or
document that has been sent is unchanged.
How it work ?
6
7
How it work?
Message
+
Signature
Message
+
Signature
HashHash
Decrypt
Signature
With Sender’s
Public Key
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
SIGN hash
With Sender’s
Private key
Message
+
signature
Message
+
signature
COMPARECOMPARE
Calculated
Hash
Calculated
Hash
MessageMessage
Sender Receiver
HashHash
SignedMessage
Sent thru’ Internet
if
OK
Signatures
verified
8
How it work ?
• The use of digital signatures usually involves two
processes, one performed by the signer and the other
by the receiver of the digital signature:
– Digital Signature Creation
• The process is performed by the sender of the
message.
– Digital Signature Verification
• The process is performed by the receiver of the
message.
9
How it work ?
• Digital Signature Creation:
– Uses a hash result derived from and unique to both the signed
message and a given private key. For the hash result to be
secure, there must be only a negligible possibility that the same
digital signature could be created by the combination of any
other message or private key.
• Digital Signature Verification:
– is the process of checking the digital signature by reference to
the original message and a given public key, thereby
determining whether the digital signature was created for that
same message using the private key that corresponds to the
referenced public key.
10
Digital Signature Framework
11
Key Requirements
• Each individual generates his own key pair, private
and public keys.
• Private key:
– Only known by the owner/sender
– Used to create the digital signature
• Public key
– It is known to everyone.
– Used to verify the digital signature.
12
Key Requirements
• Digital Certificate:
– Digital Identity that establishes your credentials when doing
business or other transactions on the Web
– Issued by a Certifying Authority (CA)
– Contains your name, serial number, expiration dates, public
key, signature of CA.
• Certificate Authority:
– Trusted Third Party.
– An organization which issues public key certificates.
– Assures the identity of the parties to whom it issues
certificates.
– Maintains online access to the public key certificates issued.
13
Private Key Protection
14
Benefits of Digital Signature
1. Authentication
– Digital signatures can be used to authenticate the source of
messages. When ownership of a digital signature secret key is
bound to a specific user, a valid signature shows that the message
was sent by that user.
– The importance of high confidence in sender authenticity is
especially obvious in a financial context.
15
Benefits of Digital Signature
2. Integrity:
– In many scenarios, the sender and receiver of a message may
have a need for confidence that the message has not been altered
during transmission.
– Although encryption hides the contents of a message, it may be
possible to change an encrypted message without understanding
it.
– If a message is digitally signed, any change in the message will
invalidate the signature.
– Furthermore, there is no efficient way to modify a message and its
signature to produce a new message with a valid signature,
because this is still considered to be computationally infeasible by
most cryptographic hash functions.
16
Paper Signature vs. Digital Signature
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature independent
of the document
Signature depends on
the contents of the
document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
17
Drawbacks of Digital Signature
• The private key must be kept in a secure manner.
• The process of generation and verification of digital
signature requires considerable amount of time.
• For using the digital signature the user has to obtain
private and public key, the receiver has to obtain the
digital signature certificate also.
18
Applications
• Electronic Mail
• Data Storage
• Electronic Funds Transfer
• Software Distribution
• Smart Cards
• Blind Signatures
• Time Stamped Signature
Thanks 
19

Contenu connexe

Tendances

Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

Tendances (20)

Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Data encryption
Data encryptionData encryption
Data encryption
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Email security
Email securityEmail security
Email security
 
Key management
Key managementKey management
Key management
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similaire à Digital Signature

csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 

Similaire à Digital Signature (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Digital signature
Digital signatureDigital signature
Digital signature
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 

Plus de Mohamed Talaat

Plus de Mohamed Talaat (7)

Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 

Dernier

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Dernier (20)

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

Digital Signature

  • 2. Agenda • What is Digital Signature? • How DS work? • General Framework of DS • Key Requirements • Private Key Protection • Benefits of Digital Signature • Drawbacks of Digital Signature • Applications 2
  • 5. 5 What is Digital Signature? • Digital Signature is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. • Digital Signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
  • 7. 7 How it work? Message + Signature Message + Signature HashHash Decrypt Signature With Sender’s Public Key Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key SIGN hash With Sender’s Private key Message + signature Message + signature COMPARECOMPARE Calculated Hash Calculated Hash MessageMessage Sender Receiver HashHash SignedMessage Sent thru’ Internet if OK Signatures verified
  • 8. 8 How it work ? • The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: – Digital Signature Creation • The process is performed by the sender of the message. – Digital Signature Verification • The process is performed by the receiver of the message.
  • 9. 9 How it work ? • Digital Signature Creation: – Uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. • Digital Signature Verification: – is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 11. 11 Key Requirements • Each individual generates his own key pair, private and public keys. • Private key: – Only known by the owner/sender – Used to create the digital signature • Public key – It is known to everyone. – Used to verify the digital signature.
  • 12. 12 Key Requirements • Digital Certificate: – Digital Identity that establishes your credentials when doing business or other transactions on the Web – Issued by a Certifying Authority (CA) – Contains your name, serial number, expiration dates, public key, signature of CA. • Certificate Authority: – Trusted Third Party. – An organization which issues public key certificates. – Assures the identity of the parties to whom it issues certificates. – Maintains online access to the public key certificates issued.
  • 14. 14 Benefits of Digital Signature 1. Authentication – Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. – The importance of high confidence in sender authenticity is especially obvious in a financial context.
  • 15. 15 Benefits of Digital Signature 2. Integrity: – In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. – Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. – If a message is digitally signed, any change in the message will invalidate the signature. – Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 16. 16 Paper Signature vs. Digital Signature Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 17. 17 Drawbacks of Digital Signature • The private key must be kept in a secure manner. • The process of generation and verification of digital signature requires considerable amount of time. • For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.
  • 18. 18 Applications • Electronic Mail • Data Storage • Electronic Funds Transfer • Software Distribution • Smart Cards • Blind Signatures • Time Stamped Signature