Professional Documents
Culture Documents
The public-key primitives used in message authentication are digital signatures. In written or
typed texts, handwritten signatures are frequently used in the physical world. They serve to bind
the message’s signatories.
A similar method that ties a person or entity to digital data is a digital signature. The receiver and
any other party may independently verify this binding. Data and a secret key, known only to the
signer, are used to calculate the digital signature, which is a cryptographic value.
In the actual world, the recipient of a message needs confirmation that it originates from the
sender and shouldn’t be able to deny its legitimacy. This condition is absolutely essential for
business applications because there is a significant probability of a dispute arising from the
sharing of data.
Each user of this scheme has a set of public and private keys.
The key pairs used for decryption as well as encryption and signing/verification are often
distinct from one another. The public key is referred to as the verification key, and the
private key is referred to as the signature key.
Data is fed into the hash function by the signer, which produces the hash.
The signature algorithm then generates the digital signature on the supplied hash using
the hash value and signature key. The data is given a signature, and both are
subsequently sent to the verifier.
The verification algorithm is fed by the verifier together with the digital signature and
verification key. The outcome of the verification algorithm is something useful.
On the data it receives, the verifier likewise uses the same hash algorithm to produce a
hash value.
This hash value and the results of the verification process are compared for verification.
The verifier determines if the digital signature is valid based on the results of the
comparison.
No one else can use the signer’s “private” key to establish a digital signature; hence, the
signer cannot later retract their signature of the data.
It should be noted that typically a hash of the data is constructed rather than signing the data
directly by the signing method. It is enough to sign the hash instead of the original data because
the hash represents a distinctive representation of the original data. The effectiveness of the
system is the main justification for using the hash instead of data for signing directly.
Let’s assume that the signing algorithm is RSA. Modular exponentiation is used in the RSA
encryption/signing process, as was covered in the chapter on public key encryption.
Modular exponentiation is a computationally expensive and time-consuming method for signing
huge amounts of data. Since the hash is a relatively brief digest of the original material, signing a
hash is more effective than signing the original data as a whole.
NEFT transaction timing on weekdays from 8.00 am to 6.30 pm and Saturdays from 8.00
am to 12.00 pm.
There is no transaction limit, but Rs.50,000 is per transaction limit.
Step 1-Use your user ID and password to sign in to your online banking account.
Step 2-Go to the NEFT Fund Transfer page.
Step 3- Enter the recipient name, bank account number and IFSC code.
Step 4-You should initiate an NEFT transfer once the beneficiary is successfully
connected. Enter the amount to be transferred and click the send button.