際際滷

際際滷Share a Scribd company logo
Message Digest &
Digital Signature.
Presented By
 Lamack Jose (Roll No 16)
 Dinesh Kodam (Roll No 34)
 Manoj Patil (Roll No 36)
Concept of Hash (Message
Digest)

2
Concept of Hash (Message
Digest)

3
Idea of a Message Digest

4
Idea of a Message Digest

5
Requirement of a Message
Digest

6
Message Digest

7
Digital Signatures

farhan.mohd@yahoo.co.in

8
Digital Signatures

9
Digital Signatures

10
Steps for the process

11
Digital Signatures

12
The Senders Side

13
The Receivers Side

14
Properties of Digital Signatures


Digital signature does not provide
privacy. If there is a need for
privacy, another layer of
encryption/decryption must be
applied.


1.
2.
3.

Digital signatures can provide
Integrity,
Authentication, and
Nonrepudiation.

15
Properties of Digital Signatures

16
Properties of Digital Signatures
1.

2.

Integrity The integrity of a message is
preserved because if Eve intercepted the
message and partially or totally changed it,
the decrypted message would be
unreadable.
Authentication We can use the following
reasoning to show how a message can be
authenticated. If Eve sends a message while
pretending that it is coming from Alice, she
must use her own private key for encryption.
The message is then decrypted with the
public key of Alice and will therefore be
nonreadable. Encryption with Eve's private
key and decryption with Alice's public key
result in garbage.

17
Properties of Digital Signatures
3.

Nonrepudiation Digital signature also provides for
nonrepudiation. Bob saves the message received
from Alice. If Alice later denies sending the
message, Bob can show that encrypting and
decrypting the saved message with Alice's private
and public key can create a duplicate of the
saved message. Since only Alice knows her
private key, she cannot deny sending the
message.

18

More Related Content

What's hot (20)

Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptxMD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
Unit 1
Unit 1Unit 1
Unit 1
Trupti Kodinariya
Hash Function
Hash FunctionHash Function
Hash Function
stalin rijal
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
Yasser Ali
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
Computer Networks Lab File
Computer Networks Lab FileComputer Networks Lab File
Computer Networks Lab File
Kandarp Tiwari
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptxMD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
Yasser Ali
Computer Networks Lab File
Computer Networks Lab FileComputer Networks Lab File
Computer Networks Lab File
Kandarp Tiwari

Viewers also liked (20)

Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
rajakhurram
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN 錚
Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
Agate Studio
Cryptography
Cryptography Cryptography
Cryptography
pravin pandey
Hash function
Hash function Hash function
Hash function
Salman Memon
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Jonathon Dosh
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN 錚
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
ijsrd.com
Network security
Network securityNetwork security
Network security
quest university nawabshah
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
Linux booting process
Linux booting processLinux booting process
Linux booting process
Prashant Hegde
Disk
DiskDisk
Disk
Krishna Yadav Kyadav308
Md5
Md5Md5
Md5
annamalai
Ch31
Ch31Ch31
Ch31
bitistu
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
Byte Rotation Algorithm
Byte Rotation AlgorithmByte Rotation Algorithm
Byte Rotation Algorithm
Engr0918
Raid_intro.ppt
Raid_intro.pptRaid_intro.ppt
Raid_intro.ppt
webhostingguy
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
rajakhurram
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN 錚
Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
Agate Studio
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Jonathon Dosh
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN 錚
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
ijsrd.com
The MD5 hashing algorithm
The MD5 hashing algorithmThe MD5 hashing algorithm
The MD5 hashing algorithm
Bob Landstrom
Linux booting process
Linux booting processLinux booting process
Linux booting process
Prashant Hegde
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
Byte Rotation Algorithm
Byte Rotation AlgorithmByte Rotation Algorithm
Byte Rotation Algorithm
Engr0918

Message digest & digital signature

  • 1. Message Digest & Digital Signature. Presented By Lamack Jose (Roll No 16) Dinesh Kodam (Roll No 34) Manoj Patil (Roll No 36)
  • 2. Concept of Hash (Message Digest) 2
  • 3. Concept of Hash (Message Digest) 3
  • 4. Idea of a Message Digest 4
  • 5. Idea of a Message Digest 5
  • 6. Requirement of a Message Digest 6
  • 11. Steps for the process 11
  • 15. Properties of Digital Signatures Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. 1. 2. 3. Digital signatures can provide Integrity, Authentication, and Nonrepudiation. 15
  • 16. Properties of Digital Signatures 16
  • 17. Properties of Digital Signatures 1. 2. Integrity The integrity of a message is preserved because if Eve intercepted the message and partially or totally changed it, the decrypted message would be unreadable. Authentication We can use the following reasoning to show how a message can be authenticated. If Eve sends a message while pretending that it is coming from Alice, she must use her own private key for encryption. The message is then decrypted with the public key of Alice and will therefore be nonreadable. Encryption with Eve's private key and decryption with Alice's public key result in garbage. 17
  • 18. Properties of Digital Signatures 3. Nonrepudiation Digital signature also provides for nonrepudiation. Bob saves the message received from Alice. If Alice later denies sending the message, Bob can show that encrypting and decrypting the saved message with Alice's private and public key can create a duplicate of the saved message. Since only Alice knows her private key, she cannot deny sending the message. 18