SlideShare une entreprise Scribd logo
1  sur  14
1
Department of Information Science and Engineering
M S Ramaiah Institute of Technology
(Autonomous Institute, Affiliated to VTU)
Bangalore-560054
Digital Signatures (Eg. VeriSign)
A presentation submitted to
M S Ramaiah Institute of Technology
An Autonomous Institute, Affiliated to
Visvesvaraya Technological University, Belgaum
in partial fulfillment of 5th Sem Under
DATA COMMUNICATIONS
Submitted by
Suman Raj K(1MS14IS417)
Suneel N P(1MS13IS114)
under the guidance of
Dr. Mydhili K. Nair
DIGITAL
SIGNATURES
(EG. VERISIGN)
Suneel N Pramodh - 1MS13IS114
Suman Raj K - 1MS14IS417
The What:
• A digital signature, the digital equivalent of a handwritten signature or
a stamped seal, is a mathematical scheme for demonstrating the
authenticity of a digital message or documents.
• Digital signature schemes, in the sense used here, are cryptographically
based, and must be implemented properly to be effective.
• Digital signatures can also provide non-repudiation, meaning that the
signer cannot successfully claim they did not sign a message, while also
claiming their private key remains secret; further, some non-
repudiation schemes offer a time stamp for the digital signature, so
that even if the private key is exposed, the signature is valid.
• Digitally signed messages may be anything representable as a bitstring: examples
include electronic mail, contracts, or a message sent via some other cryptographic
protocol. Properly implemented digital signatures are more difficult to forge than the
handwritten type.
• A digital signature scheme typically consists of three algorithms:
1. A key generation algorithm that selects a private key uniformly at random from a set
of possible private keys.The algorithm outputs the private key and a corresponding
public key.
2. A signing algorithm that, given a message and a private key, produces a signature.
3. A signature verifying algorithm that, given the message, public key and signature,
either accepts or rejects the message's claim to authenticity.
Two main properties that are required are:
1. The authenticity of a signature generated from a fixed message and
fixed private key can be verified by using the corresponding public
key.
2. It should be computationally infeasible to generate a valid signature
for a party without knowing that party's private key. A digital
signature is an authentication mechanism that enables the creator
of the message to attach a code that acts as a signature.
The How:
• As we know digital signatures use asymmetric cryptography, or public-key
cryptography.
• It is a class of cryptographic protocols based on algorithms that require two separate
keys, one of which is secret (or private) and one of which is public.
• Using a public-key algorithm such as RSA algorithm (named after scientists Ronald
Rivest, Adi Shamir, and Len Adleman), one can generate two keys that are
mathematically linked.
• To create a digital signature, signing software (such as an email program) creates a one-
way hash of the electronic data to be signed.
• The private key is then used to encrypt the hash, the encrypted hash, along with other
information such as hashing algorithm, is the digital signature.
The reason for encrypting the hash instead of the entire message or document is because:
1. For efficiency:The signature will be much shorter and thus save time since hashing is
generally much faster than signing in practice.
2. For compatibility: Messages are typically bit strings, but some signature schemes operate
on other domains (such as, in the case of RSA, numbers modulo a composite number N). A
hash function can be used to convert an arbitrary input into the proper format.
3. For integrity: Without the hash function, the text "to be signed" may have to be split
(separated) in blocks small enough for the signature scheme to act on them directly.
However, the receiver of the signed blocks is not able to recognize if all the blocks are
present and in the appropriate order.
• The value of the hash is unique to the hashed data. Any change in the data, even
changing or deleting a single character, results in a different value.This attribute
enables others to validate the integrity of the data by using the signer's public key to
decrypt the hash.
• If the decrypted hash matches a second computed hash of the same data, it proves
that the data hasn't changed since it was signed.
• If the two hashes don't match, the data has either been tampered with in some way
or the signature was created with a private key that doesn't correspond to the public
key presented by the signer.
Some digital signature algorithms that are used:
1. RSA-based signature schemes, such as RSA-PSS
2. DSA and its elliptic curve variant ECDSA
3. ElGamal signature scheme as the predecessor to DSA, and variants Schnorr signature
and Pointcheval–Stern signature algorithm
4. Rabin signature algorithm
5. Pairing-based schemes such as BLS
6. Signatures with efficient protocols - are signature schemes that facilitate efficient
cryptographic protocols such as zero-knowledge proofs or secure computation.
A public key certificate (also known as a digital certificate) which is an electronic
document used to prove ownership of a public key in public-key infrastructure scheme.
• The certificate includes information about the key, information about its owner's
identity, and the digital signature of an entity that has verified the certificate's
contents are correct.
• If the signature is valid, and the person examining the certificate trusts the signer,
then they know they can use that key to communicate with its owner.
Certificates can be created for Unix-based servers with tools such as
OpenSSL's "ca" command or SuSE's gensslcert.These may be used to issue
unmanaged certificates, certification authority (CA) certificates for managing other
certificates, and user or computer certificate requests to be signed by the CA, as well
as a number of other certificate related functions.
• Each web site (banking, merchant, e-commerce, etc.) is issued a public key and
a private key.The public key allows consumers or users to encrypt their
transactions using SSL (secure socket layer) technology.The private key allows
authorized users of the web site to receive information sent using the public
key.
• This double-handshake system assures consumers that their transaction is
secure and that only authorized representatives of the recipient's company
have access to the information (like credit card numbers or bank information)
they've sent. Some industries have established common interoperability
standards for the use of digital signatures between members of the industry
and with regulators.
• These include the Automotive Network Exchange for the automobile industry
and the SAFE-BioPharma Association for the healthcare industry.
These certificates are provided by certificate authority
organization and the most widely trusted and largest organization isVeriSign, Inc.
The web site with VeriSign stamp can be trusted completely as the authentication
unit is now owned by security software giant, Symantec.
The Why:
• A valid digital signature gives a recipient reason to believe that the message was created by a
known sender, that the sender cannot deny having sent the message, and that the message
was not altered in transit.
• Digital signatures are commonly used for software distribution, financial transactions, and in
other cases where it is important to detect forgery or tampering.
• It helps in finding out websites that are trust-able in providing a secure and proper transaction
between the sender, server and receiver.
• It also helps in determining whether a website indulges in phishing or another illegal activities,
even though they may have the image of the “VeriSign Secured”, it’ll be just that, an image
(this post is an example, it doesn't have any viable digital certificate but has the image), as we
have seen that forgery of digital signatures is very difficult and almost non-existent.
• It provides users, clients, etc. with safe and secure website/s and transactions within
that/those website/s.

Contenu connexe

Tendances

Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Digital signatures
 Digital signatures Digital signatures
Digital signaturesSTUDENT
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sigravik09783
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 

Tendances (19)

Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 

Similaire à Digital Signatures Provide Security and Trust in Online Transactions

Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySignHashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySignDrysign By Exela
 
Digital signaturepattern 10 30
Digital signaturepattern 10 30Digital signaturepattern 10 30
Digital signaturepattern 10 30Joaquin Ojeda
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 

Similaire à Digital Signatures Provide Security and Trust in Online Transactions (20)

IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Unit v
Unit vUnit v
Unit v
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySignHashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signaturepattern 10 30
Digital signaturepattern 10 30Digital signaturepattern 10 30
Digital signaturepattern 10 30
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 

Dernier

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Dernier (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Digital Signatures Provide Security and Trust in Online Transactions

  • 1. 1 Department of Information Science and Engineering M S Ramaiah Institute of Technology (Autonomous Institute, Affiliated to VTU) Bangalore-560054 Digital Signatures (Eg. VeriSign) A presentation submitted to M S Ramaiah Institute of Technology An Autonomous Institute, Affiliated to Visvesvaraya Technological University, Belgaum in partial fulfillment of 5th Sem Under DATA COMMUNICATIONS Submitted by Suman Raj K(1MS14IS417) Suneel N P(1MS13IS114) under the guidance of Dr. Mydhili K. Nair
  • 2. DIGITAL SIGNATURES (EG. VERISIGN) Suneel N Pramodh - 1MS13IS114 Suman Raj K - 1MS14IS417
  • 3. The What: • A digital signature, the digital equivalent of a handwritten signature or a stamped seal, is a mathematical scheme for demonstrating the authenticity of a digital message or documents. • Digital signature schemes, in the sense used here, are cryptographically based, and must be implemented properly to be effective. • Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non- repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid.
  • 4. • Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol. Properly implemented digital signatures are more difficult to forge than the handwritten type. • A digital signature scheme typically consists of three algorithms: 1. A key generation algorithm that selects a private key uniformly at random from a set of possible private keys.The algorithm outputs the private key and a corresponding public key. 2. A signing algorithm that, given a message and a private key, produces a signature. 3. A signature verifying algorithm that, given the message, public key and signature, either accepts or rejects the message's claim to authenticity.
  • 5. Two main properties that are required are: 1. The authenticity of a signature generated from a fixed message and fixed private key can be verified by using the corresponding public key. 2. It should be computationally infeasible to generate a valid signature for a party without knowing that party's private key. A digital signature is an authentication mechanism that enables the creator of the message to attach a code that acts as a signature.
  • 6. The How: • As we know digital signatures use asymmetric cryptography, or public-key cryptography. • It is a class of cryptographic protocols based on algorithms that require two separate keys, one of which is secret (or private) and one of which is public. • Using a public-key algorithm such as RSA algorithm (named after scientists Ronald Rivest, Adi Shamir, and Len Adleman), one can generate two keys that are mathematically linked. • To create a digital signature, signing software (such as an email program) creates a one- way hash of the electronic data to be signed. • The private key is then used to encrypt the hash, the encrypted hash, along with other information such as hashing algorithm, is the digital signature.
  • 7. The reason for encrypting the hash instead of the entire message or document is because: 1. For efficiency:The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice. 2. For compatibility: Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format. 3. For integrity: Without the hash function, the text "to be signed" may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order.
  • 8. • The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value.This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. • If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. • If the two hashes don't match, the data has either been tampered with in some way or the signature was created with a private key that doesn't correspond to the public key presented by the signer.
  • 9.
  • 10. Some digital signature algorithms that are used: 1. RSA-based signature schemes, such as RSA-PSS 2. DSA and its elliptic curve variant ECDSA 3. ElGamal signature scheme as the predecessor to DSA, and variants Schnorr signature and Pointcheval–Stern signature algorithm 4. Rabin signature algorithm 5. Pairing-based schemes such as BLS 6. Signatures with efficient protocols - are signature schemes that facilitate efficient cryptographic protocols such as zero-knowledge proofs or secure computation. A public key certificate (also known as a digital certificate) which is an electronic document used to prove ownership of a public key in public-key infrastructure scheme.
  • 11. • The certificate includes information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. • If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. Certificates can be created for Unix-based servers with tools such as OpenSSL's "ca" command or SuSE's gensslcert.These may be used to issue unmanaged certificates, certification authority (CA) certificates for managing other certificates, and user or computer certificate requests to be signed by the CA, as well as a number of other certificate related functions.
  • 12. • Each web site (banking, merchant, e-commerce, etc.) is issued a public key and a private key.The public key allows consumers or users to encrypt their transactions using SSL (secure socket layer) technology.The private key allows authorized users of the web site to receive information sent using the public key. • This double-handshake system assures consumers that their transaction is secure and that only authorized representatives of the recipient's company have access to the information (like credit card numbers or bank information) they've sent. Some industries have established common interoperability standards for the use of digital signatures between members of the industry and with regulators. • These include the Automotive Network Exchange for the automobile industry and the SAFE-BioPharma Association for the healthcare industry.
  • 13. These certificates are provided by certificate authority organization and the most widely trusted and largest organization isVeriSign, Inc. The web site with VeriSign stamp can be trusted completely as the authentication unit is now owned by security software giant, Symantec.
  • 14. The Why: • A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message, and that the message was not altered in transit. • Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. • It helps in finding out websites that are trust-able in providing a secure and proper transaction between the sender, server and receiver. • It also helps in determining whether a website indulges in phishing or another illegal activities, even though they may have the image of the “VeriSign Secured”, it’ll be just that, an image (this post is an example, it doesn't have any viable digital certificate but has the image), as we have seen that forgery of digital signatures is very difficult and almost non-existent. • It provides users, clients, etc. with safe and secure website/s and transactions within that/those website/s.