際際滷

際際滷Share a Scribd company logo
Seminar
on
Digital Signature
Prepared By: Jinkal Patel
Enrollment No: 140580702005
Guide By : Prof. Ramesh Prajapati
Saraswati College of Engineering Gujarat Technological University
& Technology
Content
 Introduction
 What is Digital Signature???
 Why Digital Signature???
 Basic Requirements.
 How the Technology Works
 Approaches
 Algorithm of Digital Signature
 Challenges and Opportunities
 Application
 Drawbacks
 Conclusion
INTRODUCTION
The authenticity of many legal, financial, and other documents is
done by the presence or absence of an authorized handwritten
signature.
癌Digital Signature is the best solution for authenticity in various
fields.
A digital signature is nothing but an attachment to any piece of
electronic information, which represents the content of the
document and the identity of the owner of that document
uniquely[5].
What is digital signature
Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document.
Digital Signature of a person therefore varies from document to
document thus ensuring authenticity of each word of that document.
As the public key of the signer is known, anybody can verify the
message and the digital signature.
Why Digital Signatures???
To provide Authenticity, Integrity and Non-repudiation to electronic
documents.
To use the Internet as the safe and secure medium for e-Commerce
and e-Governance
BASIC REQUIREMENTS.
Private Key
The private key is one which is accessible only to the signer. It is
used to generate the digital signature which is then attached to the
message.[2]
Public Key
The public key is made available to all those who receive the signed
messages from the sender. It is used for verification of the received
message.[2]
BASIC REQUIREMENTS
 Digital Signature Certificate
A subscriber of the private key and public key pair makes the public
key available to all those who are intended to receive the signed
messages from the subscriber.[1]
 But in case of any dispute between the two sides, there must be some
entity with the receiver which will allow the receiver of the message
to prove that the message was sent by the subscriber of the key pair.
This can be done with the Digital Signature Certificate.[1]
HOW THE TECHNOLOGY WORKS??
DIGITAL SIGNATURE ALGORITHM
Digital Signature Generation
DIGITAL SIGNATURE ALGORITHM
 Digital Signature Verification
DIGITAL SIGNATURE ALGORITHM
Secure Hash Algorithm
Digital Signatures
I agree
Efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
 These are digital signatures of same person on different documents
Paper Signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature
independent of the
document
Signature depends on the contents of the document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer user
b. Error free
Challenges and Opportunities
 Institutional overhead:
The cost of establishing and utilizing certification authorities,
repositories, and other important services, as well as assuring
quality in the performance of their functions.
Subscriber and Relying Party Costs:
A digital signer will require software, and will probably have to
pay a certification authority some price to issue a certificate.
Hardware to secure the subscriber's private key may also be
advisable.
APPLICATIONS ..
 Electronic Mail
 Data storage
 Electronic funds transfer
 Software Distribution
 Smart Cards
 MITRENET
 ISDN
 Time Stamped Signature
 Blind Signatures
DRAWBACKS
The private key must be kept in a secured manner.[3]
The process of generation and verification of digital signature
requires considerable amount of time.[3]
For using the digital signature the user has to obtain private and
public key, the receiver has to obtain the digital signature certificate
also.[3]
CONCLUSION
Digital signatures are difficult to understand. Digital
signatures will be championed by many players that the
public distrusts, including national security agencies, law
enforcement agencies, and consumer marketing
companies.
References
1. https://en.m.wikipedia.org/wiki/Digital_Signature
2. www.google.com
3. www.computerfun4u.blogspot.com
4. www.slideshare.net
5. Cryptography & Network Security : Principal & Practise ,William Stallings
意鞄温稼一壊!!!

More Related Content

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
Digital signature
Digital signatureDigital signature
Digital signature
Abdullah Khosa
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
Digital signature
Digital signatureDigital signature
Digital signature
Mohanasundaram Nattudurai
Digital Signature
Digital SignatureDigital Signature
Digital Signature
nayakslideshare
cryptography
cryptographycryptography
cryptography
swatihans
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
Ankita Dave
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
ravijain90
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
Ravi Ranjan
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
cryptography
cryptographycryptography
cryptography
swatihans
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
Ankita Dave
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
ravijain90
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
Ravi Ranjan
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun

Similar to Seminar ppt on digital signature (20)

Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
RajanGoyal16
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
Digital signturue
Digital signturueDigital signturue
Digital signturue
Sanjeevsharma620
Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
Digital Signature Agency
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
Digitalcertificate
Difference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdfDifference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdf
efiling24
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
Earnlogicconsultants
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
Digital Signature Agency
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Melwin Mathew
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
DigitalSignatureGurg
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
MehediHasanShaon1
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
RajanGoyal16
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
Nitesh Dubey
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
Digitalcertificate
Difference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdfDifference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdf
efiling24
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Melwin Mathew
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1

Recently uploaded (20)

only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Piping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdfPiping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdf
OMI0721
Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
Cyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptxCyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptx
Harshith A S
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Env and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdfEnv and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdf
MahmudHasan747870
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
Thane Heins NOBEL PRIZE WINNING ENERGY RESEARCHER
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
How to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using ArduinoHow to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using Arduino
CircuitDigest
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
Frankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkundeFrankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkunde
Lisa Emerson
Introduction to Safety, Health & Environment
Introduction to Safety, Health  & EnvironmentIntroduction to Safety, Health  & Environment
Introduction to Safety, Health & Environment
ssuserc606c7
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
G8 mini project for alcohol detection and engine lock system with GPS tracki...
G8 mini project for  alcohol detection and engine lock system with GPS tracki...G8 mini project for  alcohol detection and engine lock system with GPS tracki...
G8 mini project for alcohol detection and engine lock system with GPS tracki...
sahillanjewar294
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdfWater Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Piping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdfPiping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdf
OMI0721
Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
Cyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptxCyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptx
Harshith A S
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Env and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdfEnv and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdf
MahmudHasan747870
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
How to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using ArduinoHow to Build a Maze Solving Robot Using Arduino
How to Build a Maze Solving Robot Using Arduino
CircuitDigest
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
Frankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkundeFrankfurt University of Applied Science urkunde
Frankfurt University of Applied Science urkunde
Lisa Emerson
Introduction to Safety, Health & Environment
Introduction to Safety, Health  & EnvironmentIntroduction to Safety, Health  & Environment
Introduction to Safety, Health & Environment
ssuserc606c7
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
G8 mini project for alcohol detection and engine lock system with GPS tracki...
G8 mini project for  alcohol detection and engine lock system with GPS tracki...G8 mini project for  alcohol detection and engine lock system with GPS tracki...
G8 mini project for alcohol detection and engine lock system with GPS tracki...
sahillanjewar294
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37

Seminar ppt on digital signature

  • 1. Seminar on Digital Signature Prepared By: Jinkal Patel Enrollment No: 140580702005 Guide By : Prof. Ramesh Prajapati Saraswati College of Engineering Gujarat Technological University & Technology
  • 2. Content Introduction What is Digital Signature??? Why Digital Signature??? Basic Requirements. How the Technology Works Approaches Algorithm of Digital Signature Challenges and Opportunities Application Drawbacks Conclusion
  • 3. INTRODUCTION The authenticity of many legal, financial, and other documents is done by the presence or absence of an authorized handwritten signature. 癌Digital Signature is the best solution for authenticity in various fields. A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the owner of that document uniquely[5].
  • 4. What is digital signature Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document. Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature.
  • 5. Why Digital Signatures??? To provide Authenticity, Integrity and Non-repudiation to electronic documents. To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 6. BASIC REQUIREMENTS. Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message.[2] Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message.[2]
  • 7. BASIC REQUIREMENTS Digital Signature Certificate A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber.[1] But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.[1]
  • 9. DIGITAL SIGNATURE ALGORITHM Digital Signature Generation
  • 10. DIGITAL SIGNATURE ALGORITHM Digital Signature Verification
  • 12. Digital Signatures I agree Efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 These are digital signatures of same person on different documents
  • 13. Paper Signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 14. Challenges and Opportunities Institutional overhead: The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions. Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable.
  • 15. APPLICATIONS .. Electronic Mail Data storage Electronic funds transfer Software Distribution Smart Cards MITRENET ISDN Time Stamped Signature Blind Signatures
  • 16. DRAWBACKS The private key must be kept in a secured manner.[3] The process of generation and verification of digital signature requires considerable amount of time.[3] For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.[3]
  • 17. CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies.
  • 18. References 1. https://en.m.wikipedia.org/wiki/Digital_Signature 2. www.google.com 3. www.computerfun4u.blogspot.com 4. www.slideshare.net 5. Cryptography & Network Security : Principal & Practise ,William Stallings