SlideShare a Scribd company logo
1 of 30
ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI
BATCH COMMENCEMENT DATE: 2ND DECEMBER 2013
PROJECT TOPIC: EXPAIN DIGITAL SIGNATURE WITH EXAMPLES.

SUBMITTED BY: RAHUL YADAV
CRO0428146
1
2
This Is To Certify That MR. RAHUL YADAV
Has Under Taken A Project On DIGITAL
SIGNATURE WITH EXAMPLES . After Going
Through The Report, We Wish To Record Our
Satisfaction & Commend To MISS SONALI JAIN
For The Effort Put In By Their In This Exercise.
3
DIGITAL SIGNATURE WITH EXAMPLES

SUBMITTED BY RAHUL YADAV UNDER THE
GUIDANCE OF MISS SONALI JAIN (I.T.T. FACULTY)
Submitted In Partial Fulfillment For The I.T. Training Conducted By Bikaner Branch Of
I.C.A.I For The Course Of I.P.C.C.
BATCH NO. BIKANER-12/13/81
REG. NO. BKN/13-14/1607
4
While coming on acknowledgement, it seems to me closing of
long chapter of reminiscences which bloomed and gloomed at BRANCH CHAIRMEN
CA Rajiv Aeron, BIKANER BRANCH OF CIRC OF ICAI, BIKANER.

This is my proud privilege to express my sincere and deep sense
of gratitude my faculty member Ms. Sonali Jain for inspiration guidance,
persistent involvement, scholarly suggestion and constructive critical supervision
throughout the pursuit of present study.
And finally many thanks to all those friends who kept company
and who directly or indirectly helped me in the completing of this project work.

RAHUL YADAV
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

6
 Introduction
 How they work
 What is D.S Technology
 Application
 Why use..Reason
 WYSIWUS
 Public key Certificate
 Digital Certificate
 Why Digital Signature
 Paper vs Digital Signature
 Conclusion
 Bibliography
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

….8-11
..13-15
.…16
……17
…18-23
…..24
…..25
.….26
…..27
….28
….29
…..30
7
A DIGITAL SIGNATURE is a mathematical scheme for

demonstrating the authenticity of a digital message or
document. A valid digital signature gives a recipient reason to
believe that the message was created by a known sender, such
that the sender cannot deny having sent the
message(authentication and non-repudiation)and that the
message was not altered in transit(integrity). Digital signatures
are commonly used for software distribution, financial
transactions, and
in other cases where it is important to detect
forgery or tampering.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

8
Digital signatures

are often used to implement electronic
signatures, a broader term that refers to any electronic data that
carries the intent of a signature, but not all electronic signatures
use digital signatures. In some countries, including the United
States, India, and members of the European Union, electronic
signatures have legal significance.
For messages sent through a non secure channel, a
properly implemented digital signature gives the receiver reason to
believe the message was sent by the claimed sender. Digital
signatures are more difficult to forge than the handwritten type.
Digital signatures can also provide non-repudiation, meaning that
the signer cannot successfully claim they did not sign a message.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

9
A digital signature scheme typically consists of three algorithms: A key generation algorithm that selects a private key
uniformly at random from a set of possible private keys. The
algorithm outputs the private key and a corresponding public
key.
 A signing algorithm that, given a message and a private key,
produces a signature.
 A signature verifying algorithm that, given a message, public
key and a signature, either accepts or rejects the message's
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

10
In 1976, Whitfield Diffie and Martin Hellman first
described the notion of a digital signature scheme,
although they only conjectured that such schemes
existed.
Soon afterwards, Ronald Rivest, Adi
Shamir, and Len Adleman invented the RSA
algorithm, which could be used to produce primitive
digital signatures. .
The first widely marketed software
Submitted
package to offer digital no. :-By :- Rahul Yadav was Lotus Notes
signature
ITT Reg.
BKN/2013-14/1607

11
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

12
BOB
Private key(d)

ORIGINAL PLAIN TEXT
Dear Alice—The Meeting
Will be Held in Embassy

Decryption
function

CIPHERTEXT
Qrne cliae– Gur
zasder bh ke measy
Encryption
function

PLAIN TEXT
Dear Alice– The Meeting
Will be Held in Embassy .

 No Secret key is ever
exchanged.
 Alice does not need
her own key to use
the system.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

ALICE
Public key(e,n)

13
I Hereby Give You A Raise

I Hereby Give
You A Raise.

192 2343 9102

Private (d)

BOB
Encrypt with the
Private Key Attach to
the end of the original
message.

I Hereby Give You A Raise.

I Hereby Give You A
Raise.

Public (e,n)

Decrypt with the Public Key
Authenticate by Comparing to
Plaintext Message

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

ALICE
14
I Hereby Give
You A Raise.

I Hereby Give You A Raise

192 2343 9102

Evil Faked

BOB

Evil

Haye ahge kae gakg.

Public (e,n)

Signature does not
Match Message=>
Message not
Authenticated
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

I Hereby Give You A
Raise.

ALICE
15
What is Digital Signature
Technology…??
Generating message’s digest (hash result)
Using Public Key to encrypt hash result
Result of the encryption: digital signature

Sender sends
message,
digital signature and
certificate to receiver
Receiver wants to check
Integrity :-Generating hash result, compare it to the sender’s
hash result and decrypting the message with the sender’s
Submitted By :- Rahul Yadav
16
public key
ITT Reg. no. :- BKN/2013-14/1607
Authentication :Although messages may often include information about the entity
sending a message, that information may not be accurate. Digital signatures
can be used to authenticate the source of messages.
The importance of high confidence in sender authenticity is
especially obvious in a financial context.
For example, suppose a bank's branch office sends instructions to
the central office requesting a change in the balance of an account. If the
central office is not convinced that such a message is truly sent from an
authorized source, acting on such a request could be a grave mistake.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

17
How do we do this if
the
Document is Digital
and Not Paper..?
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

18
This can be Forged easliy…!

Graphic file

Has this Email Signed..?

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

19
A True Signature:
 Is Authentic.
 Cannot be Forged.
 Cannot be Refused.
 Proves document has not been Altered.
 Cannot be Repudiated.

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

20
In many scenarios, the sender and receiver of a message may
have a need for confidence that the message has not been
altered during transmission. Although encryption hides the
contents of a message, it may be possible to change an
encrypted message without understanding it.
However, if a message is digitally signed, any change in
the message after signature invalidates the signature.
Furthermore, there is no efficient way to modify a message and
its signature to produce a new message with a valid signature.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

21
Non-repudiation :-

Non-repudiation, or more specifically nonrepudiation of origin, is an important aspect of
digital signatures. By this property, an entity
that has signed some information Documents
cannot at a later time deny having signed it.
. Checking revocation status requires an
"online" check, e.g. checking Very roughly this
is analogous to a vendor who receives creditcards first checking online with the creditcard issuer to find if a given card has been
reported lost or stolen.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

22
In order to be semantically interpreted, the bit
string must be transformed into a form that is
meaningful for humans and applications, and this
is done through a combination of hardware and
software based processes on a computer system.
WYSIWYS means that the semantic
interpretation of a signed message cannot be
changed. In particular this also means that a
message cannot contain hidden information that
the signer is unaware of, and that can be
Submitted By :- Rahul Yadav
revealed after the signature has been applied. 23
ITT Reg. no. :- BKN/2013-14/1607
A public key certificate (also known as a digital certificate) is an electronic
document that uses a digital signature to bind a public key with an identity —
information such as the name of a person or an organization, their address, and
so forth.

In a typical public key infrastructure (PKI) scheme, the signature
will be of a certificate authority (CA). There are Three Companies in INDIA
which certified the Digital Signature:- 1). Infosys 2). Wipro 3). TCS
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

24
A Digital Certificate is issued by a Certification
Authority (CA) and signed with the CA's private key.
A Digital Certificate typically contains the:

 Owner's public key
 Owner's name
 Expiration date of the public key
 Name of the issuer (the CA that issued the Digital Certificate)
 Serial number of the Digital Certificate
 Digital signature of the issuer
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

25
Authentication,
Integrity,
Low cost,
Eliminates the use of paper,
Faster Procedures,
Completely Secure.
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

26
PARAMETER

DIGITAL

PAPER

Authenticity

May be Forged.

Can not be Forged.

Integrity

Signature independent of the
Document.

Signature depends on the
contents of the documents.

Non- Repudiation

a.
b.

a.
b.

Handwriting expert needed.
Error prone.

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

Any computer user.
Error free.

27
Digital signatures are a valuable technology for every major
corporation. Combined with RSAand PKI for certificate lifecycle
management digital signatures can speed up business processes.
It as well supports any other security application based on
digital certificates. For instance, Virtual Private Networks, e-mail
encryption, and secure WWW portals can be realized with the digital
certificates provided by RSA and PKI. The more applications a PKI is
used for, the more economic it gets.

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

28
My Creativity
My Efforts

MISS SONALI JAIN

ITT MODULES

Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

My Hard
Work
29
Submitted By :- Rahul Yadav
ITT Reg. no. :- BKN/2013-14/1607

30

More Related Content

What's hot (18)

What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 

Viewers also liked

BEC-DOMS Project report on Stock-Exchange
 BEC-DOMS  Project report on Stock-Exchange  BEC-DOMS  Project report on Stock-Exchange
BEC-DOMS Project report on Stock-Exchange Babasab Patil
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYITLokesh Singrol
 
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...Rakesh Kumar Raushan
 
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...Pujan Kumar Saha
 
Online vehicle renting website
Online vehicle renting websiteOnline vehicle renting website
Online vehicle renting websiteSomendra Singh
 
A project report on marketing mix of automotive sector
A project report on marketing mix of automotive sectorA project report on marketing mix of automotive sector
A project report on marketing mix of automotive sectorProjects Kart
 
A project report on commodity market with special reference to gold at karvy...
A project report on  commodity market with special reference to gold at karvy...A project report on  commodity market with special reference to gold at karvy...
A project report on commodity market with special reference to gold at karvy...Babasab Patil
 
Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.Ashish1004
 
Project report on- "A study of digital marketing services"
Project report on- "A study of digital marketing services" Project report on- "A study of digital marketing services"
Project report on- "A study of digital marketing services" MarketerBoard
 
Reliance Jio, Marketing and Business Analysis.
Reliance Jio, Marketing and Business Analysis.Reliance Jio, Marketing and Business Analysis.
Reliance Jio, Marketing and Business Analysis.MARRIVINAY
 
BBA Project Report
BBA Project ReportBBA Project Report
BBA Project ReportPankaj Kumar
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Wallarm
 

Viewers also liked (14)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
BEC-DOMS Project report on Stock-Exchange
 BEC-DOMS  Project report on Stock-Exchange  BEC-DOMS  Project report on Stock-Exchange
BEC-DOMS Project report on Stock-Exchange
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
Pradeep_Chaudhari_Report
Pradeep_Chaudhari_ReportPradeep_Chaudhari_Report
Pradeep_Chaudhari_Report
 
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...
R k Raushan- Marketing Mix of Automobile sector with special referrence to SK...
 
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...
A Project on Digital Marketing Initiatives and E-commerce Perspectives in Ban...
 
Online vehicle renting website
Online vehicle renting websiteOnline vehicle renting website
Online vehicle renting website
 
A project report on marketing mix of automotive sector
A project report on marketing mix of automotive sectorA project report on marketing mix of automotive sector
A project report on marketing mix of automotive sector
 
A project report on commodity market with special reference to gold at karvy...
A project report on  commodity market with special reference to gold at karvy...A project report on  commodity market with special reference to gold at karvy...
A project report on commodity market with special reference to gold at karvy...
 
Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.
 
Project report on- "A study of digital marketing services"
Project report on- "A study of digital marketing services" Project report on- "A study of digital marketing services"
Project report on- "A study of digital marketing services"
 
Reliance Jio, Marketing and Business Analysis.
Reliance Jio, Marketing and Business Analysis.Reliance Jio, Marketing and Business Analysis.
Reliance Jio, Marketing and Business Analysis.
 
BBA Project Report
BBA Project ReportBBA Project Report
BBA Project Report
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
 

Similar to Digital Signature

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfXtratrust Digisign Pvt ltd
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3Ankita Dave
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSCAbhishek Taxxinn
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital signature certificate in chennai
Digital signature certificate in chennaiDigital signature certificate in chennai
Digital signature certificate in chennaiSharpdigitalsignature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 

Similar to Digital Signature (20)

Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSC
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
Advance itt
Advance ittAdvance itt
Advance itt
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
Digital signature in chennai
Digital signature in chennaiDigital signature in chennai
Digital signature in chennai
 
Digital Signature in Gurgaon
Digital Signature in GurgaonDigital Signature in Gurgaon
Digital Signature in Gurgaon
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
Digital signature certificate in chennai
Digital signature certificate in chennaiDigital signature certificate in chennai
Digital signature certificate in chennai
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 

Recently uploaded

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Digital Signature

  • 1. ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI BATCH COMMENCEMENT DATE: 2ND DECEMBER 2013 PROJECT TOPIC: EXPAIN DIGITAL SIGNATURE WITH EXAMPLES. SUBMITTED BY: RAHUL YADAV CRO0428146 1
  • 2. 2
  • 3. This Is To Certify That MR. RAHUL YADAV Has Under Taken A Project On DIGITAL SIGNATURE WITH EXAMPLES . After Going Through The Report, We Wish To Record Our Satisfaction & Commend To MISS SONALI JAIN For The Effort Put In By Their In This Exercise. 3
  • 4. DIGITAL SIGNATURE WITH EXAMPLES SUBMITTED BY RAHUL YADAV UNDER THE GUIDANCE OF MISS SONALI JAIN (I.T.T. FACULTY) Submitted In Partial Fulfillment For The I.T. Training Conducted By Bikaner Branch Of I.C.A.I For The Course Of I.P.C.C. BATCH NO. BIKANER-12/13/81 REG. NO. BKN/13-14/1607 4
  • 5. While coming on acknowledgement, it seems to me closing of long chapter of reminiscences which bloomed and gloomed at BRANCH CHAIRMEN CA Rajiv Aeron, BIKANER BRANCH OF CIRC OF ICAI, BIKANER. This is my proud privilege to express my sincere and deep sense of gratitude my faculty member Ms. Sonali Jain for inspiration guidance, persistent involvement, scholarly suggestion and constructive critical supervision throughout the pursuit of present study. And finally many thanks to all those friends who kept company and who directly or indirectly helped me in the completing of this project work. RAHUL YADAV Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607
  • 6. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 6
  • 7.  Introduction  How they work  What is D.S Technology  Application  Why use..Reason  WYSIWUS  Public key Certificate  Digital Certificate  Why Digital Signature  Paper vs Digital Signature  Conclusion  Bibliography Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 ….8-11 ..13-15 .…16 ……17 …18-23 …..24 …..25 .….26 …..27 ….28 ….29 …..30 7
  • 8. A DIGITAL SIGNATURE is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message(authentication and non-repudiation)and that the message was not altered in transit(integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 8
  • 9. Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, and members of the European Union, electronic signatures have legal significance. For messages sent through a non secure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are more difficult to forge than the handwritten type. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 9
  • 10. A digital signature scheme typically consists of three algorithms: A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 10
  • 11. In 1976, Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed. Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm, which could be used to produce primitive digital signatures. . The first widely marketed software Submitted package to offer digital no. :-By :- Rahul Yadav was Lotus Notes signature ITT Reg. BKN/2013-14/1607 11
  • 12. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 12
  • 13. BOB Private key(d) ORIGINAL PLAIN TEXT Dear Alice—The Meeting Will be Held in Embassy Decryption function CIPHERTEXT Qrne cliae– Gur zasder bh ke measy Encryption function PLAIN TEXT Dear Alice– The Meeting Will be Held in Embassy .  No Secret key is ever exchanged.  Alice does not need her own key to use the system. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 ALICE Public key(e,n) 13
  • 14. I Hereby Give You A Raise I Hereby Give You A Raise. 192 2343 9102 Private (d) BOB Encrypt with the Private Key Attach to the end of the original message. I Hereby Give You A Raise. I Hereby Give You A Raise. Public (e,n) Decrypt with the Public Key Authenticate by Comparing to Plaintext Message Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 ALICE 14
  • 15. I Hereby Give You A Raise. I Hereby Give You A Raise 192 2343 9102 Evil Faked BOB Evil Haye ahge kae gakg. Public (e,n) Signature does not Match Message=> Message not Authenticated Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 I Hereby Give You A Raise. ALICE 15
  • 16. What is Digital Signature Technology…?? Generating message’s digest (hash result) Using Public Key to encrypt hash result Result of the encryption: digital signature Sender sends message, digital signature and certificate to receiver Receiver wants to check Integrity :-Generating hash result, compare it to the sender’s hash result and decrypting the message with the sender’s Submitted By :- Rahul Yadav 16 public key ITT Reg. no. :- BKN/2013-14/1607
  • 17. Authentication :Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 17
  • 18. How do we do this if the Document is Digital and Not Paper..? Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 18
  • 19. This can be Forged easliy…! Graphic file Has this Email Signed..? Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 19
  • 20. A True Signature:  Is Authentic.  Cannot be Forged.  Cannot be Refused.  Proves document has not been Altered.  Cannot be Repudiated. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 20
  • 21. In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. However, if a message is digitally signed, any change in the message after signature invalidates the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 21
  • 22. Non-repudiation :- Non-repudiation, or more specifically nonrepudiation of origin, is an important aspect of digital signatures. By this property, an entity that has signed some information Documents cannot at a later time deny having signed it. . Checking revocation status requires an "online" check, e.g. checking Very roughly this is analogous to a vendor who receives creditcards first checking online with the creditcard issuer to find if a given card has been reported lost or stolen. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 22
  • 23. In order to be semantically interpreted, the bit string must be transformed into a form that is meaningful for humans and applications, and this is done through a combination of hardware and software based processes on a computer system. WYSIWYS means that the semantic interpretation of a signed message cannot be changed. In particular this also means that a message cannot contain hidden information that the signer is unaware of, and that can be Submitted By :- Rahul Yadav revealed after the signature has been applied. 23 ITT Reg. no. :- BKN/2013-14/1607
  • 24. A public key certificate (also known as a digital certificate) is an electronic document that uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth. In a typical public key infrastructure (PKI) scheme, the signature will be of a certificate authority (CA). There are Three Companies in INDIA which certified the Digital Signature:- 1). Infosys 2). Wipro 3). TCS Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 24
  • 25. A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key. A Digital Certificate typically contains the:  Owner's public key  Owner's name  Expiration date of the public key  Name of the issuer (the CA that issued the Digital Certificate)  Serial number of the Digital Certificate  Digital signature of the issuer Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 25
  • 26. Authentication, Integrity, Low cost, Eliminates the use of paper, Faster Procedures, Completely Secure. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 26
  • 27. PARAMETER DIGITAL PAPER Authenticity May be Forged. Can not be Forged. Integrity Signature independent of the Document. Signature depends on the contents of the documents. Non- Repudiation a. b. a. b. Handwriting expert needed. Error prone. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 Any computer user. Error free. 27
  • 28. Digital signatures are a valuable technology for every major corporation. Combined with RSAand PKI for certificate lifecycle management digital signatures can speed up business processes. It as well supports any other security application based on digital certificates. For instance, Virtual Private Networks, e-mail encryption, and secure WWW portals can be realized with the digital certificates provided by RSA and PKI. The more applications a PKI is used for, the more economic it gets. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 28
  • 29. My Creativity My Efforts MISS SONALI JAIN ITT MODULES Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 My Hard Work 29
  • 30. Submitted By :- Rahul Yadav ITT Reg. no. :- BKN/2013-14/1607 30