Sunteți pe pagina 1din 13

SEMINAR

ON
DIGITAL SIGNATURE
Prepared By

Name :- Santosh Mohanty


Regd. No. :- 0821401009
Branch :- ECE
INTRODUCTION
A digital signature scheme typically consists of three
algorithms:
• Key generation algorithm
• Signing algorithm
• Signature verifying algorithm

Two main properties are required:-


1) a signature generated from a fixed message and fixed
private key should verify the authenticity of that
message by using the corresponding public key.
2) It should be computationally infeasible to generate a
valid signature for a party who does not possess the
private key.
History
In 1976, Whitfield Diffie and Martin Hellman first
described the notion of a digital signature scheme.

The first widely marketed software package to offer


digital signature was Lotus Notes 1.0, released in 1989,
which used the RSA algorithm.
What is a Digital Signature

( BAPUNI’S PUBLIC KEY)

BAPUNI ( BAPUNI’S PRIVATE KEY )

BAPUNI has been given two keys. One of BAPUNI's


keys is called a Public Key, the other is called a
Private Key.
Bapuni’ s Co-worker
:-

Anyone can get Bapuni 's


Public Key,

but Bapuni
Bapuni 's Public key is keeps his
available to anyone
Private Key towho
needs it, but he keeps his himself
Private Key to himself.
Keys are used to encrypt information.
Encrypting information means "scrambling it
up", so that only a person with the appropriate key
can make it readable again.
Either one of Bapuni's two keys can encrypt data,
and the other key can decrypt that data.
"Hey bapuni,how about HNFmsEm6Un
BejhhyCGKOK
lunch at Taco Bell. JUxhiygSBCEiC 0QYIh/

hear they have free refills!" Hn3xgiK Bcy LK1


UcYiY lxx2lCFHDC/A
HNFmsEm6Un BejhhyCGKOK "Hey bapuni, how about

JUxhiygSBCEiC 0QYIh/ Hn3xgiK lunch at Taco Bell.


BcyLK1UcYiY lxx2lCFHDC/A I
hear they have free refills!"
With his private key and the right software,
bapuni can put digital signatures on documents
and other data.
A digital signature is a "stamp" bapuni places on
the data which is unique to bapuni, and is very
difficult to forge.
To sign a document,bapuni’s software will
crunch down the data into just a few lines by a
process called "hashing". These few lines are
called a message digest. (It is not possible to
change a message digest back into the original
data from which it was created.)
bapuni's software then encrypts the message
digest with his private key. The result is the
digital signature.

Finally, bapuni’s software appends the digital


signature to document. All of the data that was
hashed has been signed.
Uses of digital signatures
As organizations move away from paper
documents with ink signatures or authenticity
stamps, digital signatures can provide added
assurances of the evidence to provenance,
identity, and status of an electronic document as
well as acknowledging informed consent and
approval by a signatory.

The United States Government Printing Office


(GPO) publishes electronic versions of the
budget, public and private laws, and
congressional bills with digital signatures.
Universities including Penn State, University of
Chicago, and Stanford are publishing electronic
student transcripts with digital signatures.
Digital signatures vs. ink on paper signatures
An ink signature can be easily replicated from one
document to another by copying the image manually or
digitally.
Digital signatures cryptographically bind an electronic
identity to an electronic document and the digital signature
cannot be copied to another document.
Paper contracts often have the ink signature block on the
last page, and the previous pages may be replaced after a
signature is applied.
Digital signatures can be applied to an entire document,
such that the digital signature on the last page will indicate
tampering if any data on any of the pages have been altered.
CONCLUSION
It is the best technology for the Security point of view.

We can easily handle this technology, for overcome


many problems.
Biblography
•J. Katz and Y. Lindell, "Introduction to Modern
Cryptography" (Chapman & Hall/CRC Press, 2007)
For books in English on electronic signatures, see:
•Stephen Mason, Electronic Signatures in Law (Tottel,
second edition, 2007);
•Dennis Campbell, editor, E-Commerce and the Law
of Digital Signatures (Oceana Publications, 2005);
•Lorna Brazell, Electronic Signatures Law and
Regulation, (Sweet & Maxwell, 2004);
•M. H. M Schellenkens, Electronic Signatures
Authentication Technology from a Legal Perspective,
(TMC Asser Press, 2004).

S-ar putea să vă placă și