Digital Signature Cryptography (My2) Saurabh Kumar CC
Digital Signature Cryptography (My2) Saurabh Kumar CC
Digital Signature Cryptography (My2) Saurabh Kumar CC
Prof.-URMILA MAHOR
HOD (CS)
TRINITY ,Bhopal
CONTENTS
. Introduction
. Basic requirements
. How does it work?
. Application
. Advantage
. Disadvantage
. Conclusion
INTRODUCTION TO DIGITAL SIGNATURE
. To use the Internet as the safe and secure medium for e-commerce and e-Governance.
BASIC REQUIREMENTS
Private Key:
Public Key:
The public key is made available to all those who receive the
signed messages from the sender. It is used for verification of
the received message
HOW DOES WORK
Digital certificate
A subscriber of theprivate key and public key pair makes the
public key available to all those who are intended to receive
the signed messages from the subscriber.
But in case of any dispute between the two sides, there must
be some entity with the receiver which will allow the receiver
of the message to prove that the message was sent by the
subscriber of the key pair. This can be done with the Digital
Certificate.
Application
Electronic Mail
Data storage
Electronic funds transfer
Software Distribution
Smart cards
ISDN
Time Stamped Signature
Blind signatures
Advantages
Authentication: Identification of the person that signs.