際際滷

際際滷Share a Scribd company logo
Seminar
on
Digital Signature
Prepared By: Jinkal Patel
Enrollment No: 140580702005
Guide By : Prof. Ramesh Prajapati
Saraswati College of Engineering Gujarat Technological University
& Technology
Content
 Introduction
 What is Digital Signature???
 Why Digital Signature???
 Basic Requirements.
 How the Technology Works
 Approaches
 Algorithm of Digital Signature
 Challenges and Opportunities
 Application
 Drawbacks
 Conclusion
INTRODUCTION
The authenticity of many legal, financial, and other documents is
done by the presence or absence of an authorized handwritten
signature.
癌Digital Signature is the best solution for authenticity in various
fields.
A digital signature is nothing but an attachment to any piece of
electronic information, which represents the content of the
document and the identity of the owner of that document
uniquely[5].
What is digital signature
Hash value of a message when encrypted with the private key of a
person is his digital signature on that e-Document.
Digital Signature of a person therefore varies from document to
document thus ensuring authenticity of each word of that document.
As the public key of the signer is known, anybody can verify the
message and the digital signature.
Why Digital Signatures???
To provide Authenticity, Integrity and Non-repudiation to electronic
documents.
To use the Internet as the safe and secure medium for e-Commerce
and e-Governance
BASIC REQUIREMENTS.
Private Key
The private key is one which is accessible only to the signer. It is
used to generate the digital signature which is then attached to the
message.[2]
Public Key
The public key is made available to all those who receive the signed
messages from the sender. It is used for verification of the received
message.[2]
BASIC REQUIREMENTS
 Digital Signature Certificate
A subscriber of the private key and public key pair makes the public
key available to all those who are intended to receive the signed
messages from the subscriber.[1]
 But in case of any dispute between the two sides, there must be some
entity with the receiver which will allow the receiver of the message
to prove that the message was sent by the subscriber of the key pair.
This can be done with the Digital Signature Certificate.[1]
HOW THE TECHNOLOGY WORKS??
DIGITAL SIGNATURE ALGORITHM
Digital Signature Generation
DIGITAL SIGNATURE ALGORITHM
 Digital Signature Verification
DIGITAL SIGNATURE ALGORITHM
Secure Hash Algorithm
Digital Signatures
I agree
Efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
 These are digital signatures of same person on different documents
Paper Signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature
independent of the
document
Signature depends on the contents of the document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer user
b. Error free
Challenges and Opportunities
 Institutional overhead:
The cost of establishing and utilizing certification authorities,
repositories, and other important services, as well as assuring
quality in the performance of their functions.
Subscriber and Relying Party Costs:
A digital signer will require software, and will probably have to
pay a certification authority some price to issue a certificate.
Hardware to secure the subscriber's private key may also be
advisable.
APPLICATIONS ..
 Electronic Mail
 Data storage
 Electronic funds transfer
 Software Distribution
 Smart Cards
 MITRENET
 ISDN
 Time Stamped Signature
 Blind Signatures
DRAWBACKS
The private key must be kept in a secured manner.[3]
The process of generation and verification of digital signature
requires considerable amount of time.[3]
For using the digital signature the user has to obtain private and
public key, the receiver has to obtain the digital signature certificate
also.[3]
CONCLUSION
Digital signatures are difficult to understand. Digital
signatures will be championed by many players that the
public distrusts, including national security agencies, law
enforcement agencies, and consumer marketing
companies.
References
1. https://en.m.wikipedia.org/wiki/Digital_Signature
2. www.google.com
3. www.computerfun4u.blogspot.com
4. www.slideshare.net
5. Cryptography & Network Security : Principal & Practise ,William Stallings
意鞄温稼一壊!!!

More Related Content

Similar to seminar-151029231027-lva1-app6892.pdf (20)

Digital signatur
Digital signaturDigital signatur
Digital signatur
Ruwandi Madhunamali
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
Digital Signature Agency
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
Digitalcertificate
Difference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdfDifference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdf
efiling24
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
Earnlogicconsultants
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
Digital signature
Digital signatureDigital signature
Digital signature
dhivyakesavan3
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
Digital Signature Agency
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Melwin Mathew
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
DigitalSignatureGurg
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
DigitalSignatureOnli
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
Digitalcertificate
Difference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdfDifference between digital signature and digital certificate.pdf
Difference between digital signature and digital certificate.pdf
efiling24
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
Mohsin Ali
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
9jz8vgkshv
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
Electronic signature
Electronic signatureElectronic signature
Electronic signature
Melwin Mathew
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
MIRZATABISHHASAN1
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
Class 3 Digital Signature Certificate in Kolkata
Class 3 Digital Signature Certificate  in KolkataClass 3 Digital Signature Certificate  in Kolkata
Class 3 Digital Signature Certificate in Kolkata
DigitalSignatureOnli

Recently uploaded (20)

The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
Computer Application in Business (commerce)
Computer Application in Business (commerce)Computer Application in Business (commerce)
Computer Application in Business (commerce)
Sudar Sudar
Essentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok SonawalaEssentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok Sonawala
Association for Project Management
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptxPOWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
MarilenQuintoSimbula
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptxCRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
PoojaSen20
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
How to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 EmployeeHow to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 Employee
Celine George
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, TuluThe Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
DrIArulAram
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
EDL 290F Week 3 - Mountaintop Views (2025).pdf
EDL 290F Week 3  - Mountaintop Views (2025).pdfEDL 290F Week 3  - Mountaintop Views (2025).pdf
EDL 290F Week 3 - Mountaintop Views (2025).pdf
Liz Walsh-Trevino
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1
The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
Computer Application in Business (commerce)
Computer Application in Business (commerce)Computer Application in Business (commerce)
Computer Application in Business (commerce)
Sudar Sudar
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptxPOWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
POWERPOINT-PRESENTATION_DM-NO.017-S.2025.pptx
MarilenQuintoSimbula
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptxCRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
PoojaSen20
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
How to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 EmployeeHow to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 Employee
Celine George
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, TuluThe Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
The Dravidian Languages: Tamil, Telugu, Kannada, Malayalam, Brahui, Kuvi, Tulu
DrIArulAram
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
EDL 290F Week 3 - Mountaintop Views (2025).pdf
EDL 290F Week 3  - Mountaintop Views (2025).pdfEDL 290F Week 3  - Mountaintop Views (2025).pdf
EDL 290F Week 3 - Mountaintop Views (2025).pdf
Liz Walsh-Trevino
QuickBooks Desktop to QuickBooks Online How to Make the Move
QuickBooks Desktop to QuickBooks Online  How to Make the MoveQuickBooks Desktop to QuickBooks Online  How to Make the Move
QuickBooks Desktop to QuickBooks Online How to Make the Move
TechSoup
Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptxFESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
FESTIVAL: SINULOG & THINGYAN-LESSON 4.pptx
DanmarieMuli1

seminar-151029231027-lva1-app6892.pdf

  • 1. Seminar on Digital Signature Prepared By: Jinkal Patel Enrollment No: 140580702005 Guide By : Prof. Ramesh Prajapati Saraswati College of Engineering Gujarat Technological University & Technology
  • 2. Content Introduction What is Digital Signature??? Why Digital Signature??? Basic Requirements. How the Technology Works Approaches Algorithm of Digital Signature Challenges and Opportunities Application Drawbacks Conclusion
  • 3. INTRODUCTION The authenticity of many legal, financial, and other documents is done by the presence or absence of an authorized handwritten signature. 癌Digital Signature is the best solution for authenticity in various fields. A digital signature is nothing but an attachment to any piece of electronic information, which represents the content of the document and the identity of the owner of that document uniquely[5].
  • 4. What is digital signature Hash value of a message when encrypted with the private key of a person is his digital signature on that e-Document. Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document. As the public key of the signer is known, anybody can verify the message and the digital signature.
  • 5. Why Digital Signatures??? To provide Authenticity, Integrity and Non-repudiation to electronic documents. To use the Internet as the safe and secure medium for e-Commerce and e-Governance
  • 6. BASIC REQUIREMENTS. Private Key The private key is one which is accessible only to the signer. It is used to generate the digital signature which is then attached to the message.[2] Public Key The public key is made available to all those who receive the signed messages from the sender. It is used for verification of the received message.[2]
  • 7. BASIC REQUIREMENTS Digital Signature Certificate A subscriber of the private key and public key pair makes the public key available to all those who are intended to receive the signed messages from the subscriber.[1] But in case of any dispute between the two sides, there must be some entity with the receiver which will allow the receiver of the message to prove that the message was sent by the subscriber of the key pair. This can be done with the Digital Signature Certificate.[1]
  • 9. DIGITAL SIGNATURE ALGORITHM Digital Signature Generation
  • 10. DIGITAL SIGNATURE ALGORITHM Digital Signature Verification
  • 12. Digital Signatures I agree Efcc61c1c03db8d8ea8569545c073c814a0ed755 My place of birth is at Gwalior. fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25 I am 62 years old. 0e6d7d56c4520756f59235b6ae981cdb5f9820a0 I am an Engineer. ea0ae29b3b2c20fc018aaca45c3746a057b893e7 I am a Engineer. 01f1d8abd9c2e6130870842055d97d315dff1ea3 These are digital signatures of same person on different documents
  • 13. Paper Signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free
  • 14. Challenges and Opportunities Institutional overhead: The cost of establishing and utilizing certification authorities, repositories, and other important services, as well as assuring quality in the performance of their functions. Subscriber and Relying Party Costs: A digital signer will require software, and will probably have to pay a certification authority some price to issue a certificate. Hardware to secure the subscriber's private key may also be advisable.
  • 15. APPLICATIONS .. Electronic Mail Data storage Electronic funds transfer Software Distribution Smart Cards MITRENET ISDN Time Stamped Signature Blind Signatures
  • 16. DRAWBACKS The private key must be kept in a secured manner.[3] The process of generation and verification of digital signature requires considerable amount of time.[3] For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.[3]
  • 17. CONCLUSION Digital signatures are difficult to understand. Digital signatures will be championed by many players that the public distrusts, including national security agencies, law enforcement agencies, and consumer marketing companies.
  • 18. References 1. https://en.m.wikipedia.org/wiki/Digital_Signature 2. www.google.com 3. www.computerfun4u.blogspot.com 4. www.slideshare.net 5. Cryptography & Network Security : Principal & Practise ,William Stallings