digitAL SIGNATURE

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

StudyMafia.

Org

Digital
Signature

Submitted To: Submitted By:


Studymafia.org Studymafia.org
Table Contents
 Definition
 Introduction
 Working of Digital Signature
 About Digital Signature
 Conclusion

2
Definition
A digital signature is a mathematical scheme for
verifying the authenticity of digital messages or
documents.

3
Introduction

• A valid digital signature, where the


prerequisites are satisfied, gives a recipient very
high confidence that the message was created
by a known sender (authenticity), and that the
message was not altered in transit (integrity).
• Digitally signed messages may be anything
representable as a bitstring: examples include
electronic mail, contracts, or a message sent via
some other cryptographic protocol.
4
●●●
5
Working of Digital Signature
Hash function –
• A hash function (also called a “hash”) is a
fixed-length string of numbers and letters
generated from a mathematical algorithm
and an arbitrarily sized file such as an email,
document, picture, or other type of data.

●●●
6
Working of Digital Signature
Public key cryptography –
• Public key cryptography (also known as
asymmetric encryption) is a cryptographic
method that uses a key pair system. One key,
called the public key, encrypts the data. The
other key, called the private key, decrypts the
data.

●●●
7
Working of Digital Signature
Public key infrastructure (PKI) –
• PKI consists of the policies, standards,
people, and systems that support the
distribution of public keys and the identity
validation of individuals or entities with
digital certificates and a certificate authority.

●●●
8
Working of Digital Signature
Certificate authority (CA) –
• A CA is a trusted third party that validates a
person’s identity and either generates a
public/private key pair on their behalf or
associates an existing public key provided by
the person to that person.
• Once a CA validates someone’s identity, they
issue a digital certificate that is digitally
signed by the CA.
●●●
9
Working of Digital Signature
Digital certificates –
• Digital certificates are analogous to driver
licenses in that their purpose is to identify
the holder of a certificate. Digital certificates
contain the public key of the individual or
organization and are digitally signed by a CA.
• Other information about the organization,
individual, and CA can be included in the
certificate as well.
●●●
10
Working of Digital Signature
• Pretty Good Privacy (PGP)/OpenPGP –
PGP/OpenPGP is an alternative to PKI. With
PGP/OpenPGP, users “trust” other users by
signing certificates of people with verifiable
identities.
• The more interconnected these signatures
are, the higher the likelihood of verifying a
particular user on the internet. This concept
is called the “Web of Trust.”

11
About Digital Signature
• Digital signatures work by proving that a
digital message or document was not
modified—intentionally or unintentionally—
from the time it was signed.
• Digital signatures do this by generating a
unique hash of the message or document
and encrypting it using the sender’s private
key.

●●●
12
About Digital Signature
• The hash generated is unique to the
message or document, and changing any
part of it will completely change the hash.
• The recipient then generates their own hash
of the message or digital document and
decrypts the sender’s hash (included in the
original message) using the sender’s public
key.

●●●
13
About Digital Signature
• Once completed, the message or digital
document is digitally signed and sent to the
recipient.
• The recipient compares the hash they
generate against the sender’s decrypted
hash; if they match, the message or digital
document has not been modified and the
sender is authenticated.

14
Conclusion

 A digital signature is an electronic, encrypted,


stamp of authentication on digital information
such as email messages, macros, or electronic
documents.
 A signature confirms that the information
originated from the signer and has not been
altered.

15
References
• Google.com
• Wikipedia.org
• Studymafia.org
• Slidespanda.com
Thanks
To
StudyMafia.org

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy