Documente Academic
Documente Profesional
Documente Cultură
SIGNATURE
Digital Signatures
Adigital signatureordigital signature
schemeis a mathematical scheme for
demonstrating the authenticity of a
digital message or document.
A digital signature can be used with any
kind of message, whether it is encrypted
or not, simply so that the receiver can be
sure of the sender's identity and that the
message arrived intact.
Contents
Electronic Record
1. Very easy to make copies
2. Very fast distribution
3. Easy archiving and retrieval
4. Copies are as good as original
5. Easily modifiable
6. Environmental Friendly
Digital Signatures
My name is Barack Obama
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is Delhi..
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am an Indian.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am a CFA Charter holder.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am an idiot.
01f1d8abd9c2e6130870842055d97d315dff1ea3
These are digital signatures of same person on different documents
Public Key
Infrastructure
Meeting legal Requirement
-Privacy: Only intended recipient can read
the files
-Integrity: Guarantees files are unaltered
during
transmission
-Authentication: Ensures that parties
involved are
who they claim to be
-Non-repudation: Prevents individuals from
Smart Cards
Hardware Tokens
Message
The Hash
Algorithm creates
a unique abstract
of the message
Message
Hash Function
Digital Signature
Private key of
sender Encrypts
Digest
Message Digest
160 bit
Value
Digital Signature
Encrypted Digest
Becomes Digital
Signature
Encrypted
Message &
Signature
Message
Encrypted
Message &
Signature
Encrypted
One Time Key
Digital Signature
Receivers
Public Key
Encrypts One-
Second
Message Digest
Produced
Message Digest 2
Encrypted
Message &
Signature
Receivers Private Key
Decrypts one-time
Symmetric key
Hash Function
Message
Message Digest
Original Digest
compared to second
Digest for identical
Match to confirm
Message Digest
Digital Signature
PKI Applications
E-mail with customers, partners and
Employees
e-Commerce including data exchange
and financial transactions.
Digital contract including loans,
leases and Mortgages.
Remote Access to corporate
databases.
Certificate
Authority
CA
Repository
Dbase
Receiving
Party
Subscriber
4
Digital Certificate
An electronic document issued by a
certifying authority to establish a
merchants identity.
Certificate authority:
A trusted entity that issues and revokes
public key certificates and manages key
pairs
Authorities like VeriSign, Cybertrust,
Postal Services, TCS, MTNL and many
more.
Validity period
Serial number
Signature
algorithm ID
User unique
identifier
Issuer name
Digital
signature
User name
Class2:
Checks for information like real name, UIN and
DOB.
They require proof of physical address, locale
and e-mail id.
Can be compared with a credit card.
Strongest type.
Can be compared with driving license
To get them you need to prove who you are
and you are responsible.
Used for sensitive transactions like loan
acquisition online.
Class4:
Uses of digital
signatures
1. Authentication.
2. Integrity .
Additional security precautions:1. Putting the private key on a smart
card.
2. Using smart card readers with a
separate keyboard.
3. Other smart card designs.
4. Using digital signatures only with
trusted applications.
V/s
Paper
Electronic
Authenticity
May be forged
Integrity
Signature
independent of the
document
Signature depends
on the contents of
the document
Nonrepudiation
a.
b.
Handwriting a.
expert needed
Error prone
b.
Any
computer user
Error free
FUTURE SCENARIO
Digital encryption of data is useful during
storage and retrieval of medical history of
patients involved in e-Health programs.
The growth of e-commerce and the recent
enactment of the Electronic Signatures in
Global and National Commerce Act (E-Sign
Act) has opened a new frontier.
With this constant development key
management is becoming an issue.
Advancements in HotJava and JavaPlugin
based technologies will maintain fluidity
and flexibility in key management.