You are on page 1of 9

DIGITAL SIGNATURE

NAME: Jyoti M.Pai CLASS: M COM Part 1 REGISTERATION NO: 1121 SUBJECT: E-COMMERCE & ITS APPLICATION

DIGITAL SIGNATURE

Meaning A digital signature authenticates electronic documents in a similar manner

a handwritten signature authenticates printed documents.

Digital signatures rely on certain types of encryption to ensure authentication.

1. 2. 3.

Advantages Authentication Integrity Non Repudiation

ENCRYPTION

Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

Private Key Encryption Public Key Encryption Hash Value and Message Digest

Encryption And Decryption ( Example)


Bob's Co-worker:
(Bob's public key) (Bob's private key) Tiny

Bob
"Hey Bob, how
about lunch at Taco Bell. I hear they have free refills!" HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A

HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A

"Hey Bob, how


about lunch at Taco Bell. I hear they have free refills!"

DIGITAL CERTIFICATE

Digital Certificate is a data with digital signature from one trusted Certification Authority (CA). This data contains:

Who owns this certificate Who signed this certificate The expired date User name & email address

Person Info: Name Elements of Digital Certificate: Department Certificate Info: Expiration Date Serial Number Person Public Key:

Working Of Digital Signature Data Hash Function Value Own Computer


Private Key

Digital certificate

Message Digest

Internet Web Channels

Message Digest
Public key

Data with Digital Certificate

Hash function

Value

Receiver Computer

WORKING OF DIGITAL SIGNATURE (EXAMPLE)

Step 1: Getting a Private and Public Key

1. 2. 3.

Step 2: Signing an Electronic Document Initiate the signing process Create a digital signature Append the signature to the document Step 3: Tom Initiates the validation process Decrypts Bob's signature Compares Bob's document fingerprint with his calculated one

1.

2.
3.

Thank you

You might also like