SlideShare a Scribd company logo
1 of 176
Download to read offline
Introduction to
digital
signatures
Benedictine University
MATH 390: Cryptography
2 April 2008

Robert Talbert, PhD
Associate Professor of Mathematics and
Computing Science
Franklin College, Franklin, IN




                                         1
Menu




       2
Menu
The problem of authentication




                                2
Menu
The problem of authentication

Non-solutions to the authentication problem; the
concept of the digital signature and required
parameters




                                                   2
Menu
The problem of authentication

Non-solutions to the authentication problem; the
concept of the digital signature and required
parameters

Digital signatures using public-key encryption
algorithms




                                                   2
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures
Introduction To Digital Signatures

More Related Content

Viewers also liked

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
PSPCL
 
Process flow for registering digital signature certificate
Process flow for registering digital signature certificateProcess flow for registering digital signature certificate
Process flow for registering digital signature certificate
PSPCL
 

Viewers also liked (18)

Digital certificates
Digital certificates Digital certificates
Digital certificates
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
 
Process flow for registering digital signature certificate
Process flow for registering digital signature certificateProcess flow for registering digital signature certificate
Process flow for registering digital signature certificate
 
rsa-1
rsa-1rsa-1
rsa-1
 
Использование электронной подписи Технологические возможности и практика
Использование электронной подписи Технологические возможности и практикаИспользование электронной подписи Технологические возможности и практика
Использование электронной подписи Технологические возможности и практика
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
The SHA Hashing Algorithm
The SHA Hashing AlgorithmThe SHA Hashing Algorithm
The SHA Hashing Algorithm
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Ch13
Ch13Ch13
Ch13
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Mobile number protability
Mobile number protability  Mobile number protability
Mobile number protability
 
Ch12
Ch12Ch12
Ch12
 

More from Robert Talbert

More from Robert Talbert (18)

Followup activities for Module 1A
Followup activities for Module 1AFollowup activities for Module 1A
Followup activities for Module 1A
 
In-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1AIn-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1A
 
Flipping the classroom: Delta College
Flipping the classroom: Delta CollegeFlipping the classroom: Delta College
Flipping the classroom: Delta College
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 
The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...
 
Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...
 
Teaching and learning in the inverted classroom
Teaching and learning in the inverted classroomTeaching and learning in the inverted classroom
Teaching and learning in the inverted classroom
 
Learning matlab in the inverted classroom
Learning matlab in the inverted classroom Learning matlab in the inverted classroom
Learning matlab in the inverted classroom
 
Classroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through votingClassroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through voting
 
Making proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof coursesMaking proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof courses
 
Inverting the classroom, improving student learning
Inverting the classroom, improving student learningInverting the classroom, improving student learning
Inverting the classroom, improving student learning
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 
Changes to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin CollegeChanges to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin College
 
Presentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment studentsPresentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment students
 
Mat 140 Cryptology Day 4
Mat 140 Cryptology Day 4Mat 140 Cryptology Day 4
Mat 140 Cryptology Day 4
 
Mat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 PresentationMat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 Presentation
 
Mat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationMat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 Presentation
 
Mat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 PresentationMat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 Presentation
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Introduction To Digital Signatures