Digital Signature

12
Digital Signature presented by:- sailendra kumar dash

description

digital signature used and verification by sailendra dash

Transcript of Digital Signature

Page 1: Digital Signature

Digital Signature

presented by:- sailendra kumar dash

Page 2: Digital Signature

Content

How digital signature is used

Digital signature creation

Digital signature verification

Page 3: Digital Signature

How digital signature is used

Digital signatures are created and verified by cryptography

Digital signatures use public key cryptography techinique, which employees an algorithm using two different but mathematically realted keys that is

One for creating a Digital signature or transfering data into a seemingly unintelligible form

Page 4: Digital Signature

Contd…….

Another key for verifying a Digital signature or returning the message to its original form

Computer equipement and software utilising two such key are often collectively termed as an “asymmetric cryptosystem”

The complementary keys of an asymmetric cryptosystem for Digital signature are arbitrarily termed the private key which is known only to the signer and is used to creat the Digital signature and the public key which is ordinarly more widely known and is used by a replying party to verify the digital signature.

Page 5: Digital Signature

How to create and verify digital signature

Another fundamental process termed as hash function is used in both creating and verifying a digital signature.

It is an algorithm, which creates a digital representation in the form of a hash value of a standard length,which is usually much smaller than the message but nevertheless, substantially unique to it

Use of digital signature involves two processes that is

Page 6: Digital Signature

Contd…….. One perform by the signer And other by reciver of digital signature. that is digital signature creation

which uses a hash result derived form a unique to both the signed message and a given private keyFor the hashresult to be secure there must be a negligible possibility that the same digital signature could be created by the combination of any other message or private key

Page 7: Digital Signature

Contd….

Digital signature verification the processes of checking digital signature by reference to the original message and a given public key ,there by determining whether the digital signature was created for the same message using the private key that correspends to the reference public key

Page 8: Digital Signature

How digital signature is applied

Suppose mr A want to send his signed message to mr B through internet, he can use the public key cryptosystem to provide digital signatures.

Mr A use his own private key to create a digital signature and mr B will use A’s public to verify this digital signature.

On the digital signature creation side mr A creates a digital signature using his private key

Page 9: Digital Signature

Contd…

This process makes message in encrypted form and results as signed message. the signed message is then send through the internet to mr B.

On the digital signature verification side ,mrB receive the message ,together with the digital signature from the internet

Mr B gets a copy of mr A public key and verify the signature by A’S public key.

Page 10: Digital Signature

Contd…

This process results in the decryption of the message with A’S public key. If the result after decryption is same as the transmitted message mr B can believe that message has really come form mr A. this is because mr A holds the private key , which is need to generate the digital signature.

Page 11: Digital Signature
Page 12: Digital Signature

Thank you