SlideShare a Scribd company logo
What is Digital Signature Building confidentiality  and trust  into networked transactions. Adv. Prashant Mali   [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law  &  IPR Expert
Encryption It is a  technique of converting  plain text  into  ciphertext  and reconverting it into  plain text .
Basic Techniques of  Encryption Transposition Cipher Substitution Cipher Product Cipher
Basic Techniques of  Encryption-  Transposition Cipher Encrypts by changing the order of characters in the text. e.g. : Replace 1st character with 6th  2nd with 7th 3rd with 8th 4th with 9th 5th with 10th and so on
Basic Techniques of  Encryption-  Transposition Cipher WE WILL ATTACK ON BHAI ON SUNDAY LL ATWE WI ON BHTACK  SUNDAAI ONY  TRANSPOSE
Basic Techniques of  Encryption-  Substitution  Cipher Encrypts by replacing the characters in the text with characters in a “Key” on the basis of some rule. e.g. : Key is “MANISH” and  Rule is Replace all  A in the text with M B with A C with N D with I E with S F with H G with A and so on
Basic Techniques of  Encryption-  Substitution Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTE
Basic Techniques of  Encryption-  Product Cipher Combination of Transposition and Substitution  Take a Key replace the characters in the text with characters in the  Key. Transpose the result.
Basic Techniques of  Encryption-  Product Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTE TRANSPOSE S DR DKILQI NDTM BLLY
Elements of Encryption Encryption Algorithm (function used to encrypt or decrypt) Encryption keys (information used to cipher) Encryption method Decryption method Plain  text Plain text Encryption key Decryption Key Cipher text
Good Encryption System: Features Short Key Strong Algorithm High work factor Low error propagation
Encryption Building confidentiality  and trust  into networked transactions. CHANGING THE WAY  OF DOING BUSINESS
A MATTER OF TRUST Building Trust:  Direct trust relationship Using  Encryption
Some every day transactions: Why do we place trust in these transactions? Authentication Confidentiality Integrity Non-repudiation Credit Card Contract Notarized Notarized Document Medical Records
Ways of  Encryption Two ways of encryption Symmetric Key or  Private Key Encryption Asymmetric Key or   Public Key Encryption  (abbreviated as PKI)
Symmetric Cryptosystem Also called private key infrastructure Cleartext Message Cipher Text Cleartext Message DES | RC4 DES | RC4 Four score and seven years ago, our forefathers brought forth the proposition Four score and seven years ago, our forefathers brought forth the proposition sdfklj98a475$56jhgv98456vjnf84576FGHH78lfkghj-506#6lkjg4#$5;lkn;t7;lsk%0
Symmetric Cryptosystem Similar key is used for encryption and decryption Both parties should know the same key Also called private key infrastructure Secured transmission of encryption key to other person is a problem . Original  Message Original  Message Encrypted  Message Encrypted  Message
Asymmetric Cryptosystem Also called Public Key Infrastructure (PKI) Improvement over Private Key System Provides all elements expected from a secure  transaction : Authentication Confidentiality Integrity Non-repudiation Accordingly generates : Signed message Secret message Signed and Secret message
Public Key System One half of a key pair is used to encrypt, the other half is used to decrypt. Encryption Recipient’s Public Key Recipient’s Private Key Decryption
Public Key Infrastructure(PKI) Uses a pair of keys. One part of pair is used for encryption  Another part is used for decryption One part is kept private (called private key of a person) and  another is made public (called public key of a person) Any key (public or private) can be used for encryption and  then another is  used for decryption Same key can not be used for encryption and decryption  both. There has to be combination of both  keys. Basic Methodology
Public Key Infrastructure(PKI) To generate a  secret  message  Message is encrypted by sender with Receiver’s public key and  It is decrypted by receiver with his private key.  How messages are generated Confidentiality Integrity It ensures : Original  Message Encrypted  Message  Receiver’s public key Encrypted  Message Original  Message Receiver’s  private key Encryption Decryption
Public Key Infrastructure(PKI) To generate a  signed  message  Message is encrypted by sender with Sender’s private key and  It is decrypted by receiver with Sender’s public key.  How messages are generated Authentication Non Repudiation It ensures : Original  Message Encrypted  Message  Sender’s private key Encrypted  Message Original  Message Sender’s  public key Encryption Decryption
Asymmetric Cryptosystem To generate a  signed and secret  message : Message is first encrypted by sender with Sender’s private key.  This encrypted message is  again encrypted with Receiver’s public key  It is decrypted by receiver first with his private key and then with sender’s public key. How messages are generated It ensures : Authentication Non Repudiation Integrity Confidentiality Original  Message Encrypted  Message I Sender’s  private key Encrypted  Message II Receiver’s public key Encrypted  Message II Encrypted  Message I Original  Message Sender’s  public key Receiver’s  private key
Digital Signatures Digital signatures are hash code of a document encrypted with sender’s private key.  For sending the message, first hash code of message is generated. This hash code is encrypted using sender’s private key. The  message is sent along with encrypted hash code. At other end, receiver decrypts hash code with sender’s public key.  He also on his own calculates hash code of the message received.  Two hash codes should tally. Authentication It ensures : Non Repudiation Integrity Basic Methodology
Digital Signatures In earlier process, message has been sent in clear text form thus confidentiality has not been achieved.  To overcome this problem, message and encrypted hash code may be encrypted by a symmetric key.  This symmetric key is also then encrypted with receiver’s public key.  All these i.e. Message and encrypted hash code which are now encrypted with symmetric key and symmetric key itself which is now encrypted with receiver’s public key, are sent to receiver.  Receiver first decrypt the symmetric key with his private key and then decrypt message and hash code with this symmetric key.
How does PKI work? Original Message Encrypted & Signed Sender’s Private Key Hash Code Digital Signature Symmetric Key Recipient’s Public Key Encrypted Symmetric Key Sender Original Message
How does PKI work? Encrypted & Signed Symmetric Key Encrypted Symmetric Key Recipient’s Private Key Original Message Hash Algorithm Hash Code Digital Signature Sender’s Public Key Message  verified Recipient
Digital Certificate Certificate ties a participant to public key The authenticity of the certificate is guaranteed  by the digital signature generated using the  CA’s private key. Validity Period Expires:   31   December 2022 Public Key: Signed:  CA’s Signature Name:  Prashant Mali Number:  2564567A ID Number & Name A Digital Certificate is a digitally signed document  that associates a public key with a user. private
Key Lifecycle Management Key Generation Certificate Issuance Key Usage or Certificate Validation Key Expiry Key Update
Encryption Standard Data Encryption standard A short key, strong algorithm system Uses a 64 bit key, 56 bits for algorithm and 8 bits are parity RSA  (Rivest, Shamir, Adalman) Public key system. Once private key is used to encrypt, it can be decrypted only using its public key and vice-versa.
Thank You Questions Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell:  9821763157

More Related Content

PPT
Digital signature
PPT
Digital signature
PPTX
Digital signature & eSign overview
PPT
Digital signature introduction
PPTX
Digital signature
PPT
Digital signature
PPT
Information and data security digital signatures
PPT
Digital signatures
Digital signature
Digital signature
Digital signature & eSign overview
Digital signature introduction
Digital signature
Digital signature
Information and data security digital signatures
Digital signatures

What's hot (18)

PPTX
Digital Signatures
PPT
C08 crypto-digital signature13
PPTX
Digital certificates
DOCX
Ds over
DOCX
Literature review of Digital Signature
PPTX
Digital certificates
PPT
Introduction to Digital signatures
PPT
What is a Digital Signature? | How Digital Signature work?
PPT
Digital signature Brief Introduction
PDF
Digital Signature
PPSX
Digital signature
PPT
Digital Signature
PPT
Presentation on digital signatures & digital certificates
PPTX
Digital Signature
PPTX
Digital Signatures
PPTX
Digital signatures
PPT
Digital signature
Digital Signatures
C08 crypto-digital signature13
Digital certificates
Ds over
Literature review of Digital Signature
Digital certificates
Introduction to Digital signatures
What is a Digital Signature? | How Digital Signature work?
Digital signature Brief Introduction
Digital Signature
Digital signature
Digital Signature
Presentation on digital signatures & digital certificates
Digital Signature
Digital Signatures
Digital signatures
Digital signature
Ad

Viewers also liked (20)

PPTX
Seminar ppt on digital signature
PPT
Digital Signature
PPT
Digital Signature
PDF
E tutorial - digital signature
PPT
Stallings Kurose and Ross
PDF
Digital signature efficient, cut cost and manage risk
PPT
network security
PPTX
Information system security wk5-1-pki
PPTX
CMACs and MACS based on block ciphers, Digital signature
PPT
Security
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
E tutorial-filing correction
PDF
Digital signatures
PDF
Network Security Fundamentals
PPTX
Trade mark
PDF
Copyright Presentation
PDF
Trademark shraddha singhi
PPTX
Copyright act
PPTX
Copyright
PPT
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Seminar ppt on digital signature
Digital Signature
Digital Signature
E tutorial - digital signature
Stallings Kurose and Ross
Digital signature efficient, cut cost and manage risk
network security
Information system security wk5-1-pki
CMACs and MACS based on block ciphers, Digital signature
Security
Cryptography and Network Security William Stallings Lawrie Brown
E tutorial-filing correction
Digital signatures
Network Security Fundamentals
Trade mark
Copyright Presentation
Trademark shraddha singhi
Copyright act
Copyright
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Ad

Similar to What is digital signature or DSC (20)

PPT
Whatisdigitalsignature
PPT
Whatisdigitalsignature
PPTX
Key distribution code.ppt
DOCX
PPTX
Encryption in Cryptography
PPTX
IT235 POC - Unit I priciples of cryptography
PPT
Encryption
PPT
Cryptography
PPTX
PDF
Cgi whpr 35_pki_e
PDF
Public private key
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPT
Secure payment systems
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
PPTX
Network Security Unit-2 topic Part-1.pptx
PPT
Public Key Infrastructure and Application_Applications.ppt
PPTX
Cryptography and Network Security Principles.pptx
PPT
PKI_Applications digital certificate.ppt
PPT
cryptography
PPTX
Computer Introduction-Lecture05
Whatisdigitalsignature
Whatisdigitalsignature
Key distribution code.ppt
Encryption in Cryptography
IT235 POC - Unit I priciples of cryptography
Encryption
Cryptography
Cgi whpr 35_pki_e
Public private key
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
Secure payment systems
Computer System Security (UNIT IV) For AKTU Lucknow
Network Security Unit-2 topic Part-1.pptx
Public Key Infrastructure and Application_Applications.ppt
Cryptography and Network Security Principles.pptx
PKI_Applications digital certificate.ppt
cryptography
Computer Introduction-Lecture05

More from Adv Prashant Mali (15)

PDF
Electronic evidence for delhi judicial academy prashant mali
PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PPTX
9 things about indian cyber law prashant mali
PPTX
Social Media and Cyber Law in India By Prashant Mali
PPT
Electronic evidence digital evidence in india
PPT
Electronic Evidence fraud conference
PPT
Cloud computing legal issues
PPT
What is business continuity planning-bcp
PPT
Email crimes and IT Law-Nasscom cyber safe 2010
PPT
Email crimes and IT Law-Nasscom cyber safe 2010
PPT
Email crimes and Cyber Law-Nasscom Cyber safe 2010
PPT
Legal aspects of IT Security-at ISACA conference 2011
PPT
Cloud computing and Law-India legal summit
PPT
Cloud computing and law-India legal summit 2011
PPT
Legal aspects of IT security
Electronic evidence for delhi judicial academy prashant mali
Cyber warfare Threat to Cyber Security by Prashant Mali
9 things about indian cyber law prashant mali
Social Media and Cyber Law in India By Prashant Mali
Electronic evidence digital evidence in india
Electronic Evidence fraud conference
Cloud computing legal issues
What is business continuity planning-bcp
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Legal aspects of IT Security-at ISACA conference 2011
Cloud computing and Law-India legal summit
Cloud computing and law-India legal summit 2011
Legal aspects of IT security

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25 Week I

What is digital signature or DSC

  • 1. What is Digital Signature Building confidentiality and trust into networked transactions. Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB ] Cyber Law & IPR Expert
  • 2. Encryption It is a technique of converting plain text into ciphertext and reconverting it into plain text .
  • 3. Basic Techniques of Encryption Transposition Cipher Substitution Cipher Product Cipher
  • 4. Basic Techniques of Encryption- Transposition Cipher Encrypts by changing the order of characters in the text. e.g. : Replace 1st character with 6th 2nd with 7th 3rd with 8th 4th with 9th 5th with 10th and so on
  • 5. Basic Techniques of Encryption- Transposition Cipher WE WILL ATTACK ON BHAI ON SUNDAY LL ATWE WI ON BHTACK SUNDAAI ONY TRANSPOSE
  • 6. Basic Techniques of Encryption- Substitution Cipher Encrypts by replacing the characters in the text with characters in a “Key” on the basis of some rule. e.g. : Key is “MANISH” and Rule is Replace all A in the text with M B with A C with N D with I E with S F with H G with A and so on
  • 7. Basic Techniques of Encryption- Substitution Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTE
  • 8. Basic Techniques of Encryption- Product Cipher Combination of Transposition and Substitution Take a Key replace the characters in the text with characters in the Key. Transpose the result.
  • 9. Basic Techniques of Encryption- Product Cipher INDORE IS A GOOD CITY DKILQS DR M BLLI NDTY SUBSTITUTE TRANSPOSE S DR DKILQI NDTM BLLY
  • 10. Elements of Encryption Encryption Algorithm (function used to encrypt or decrypt) Encryption keys (information used to cipher) Encryption method Decryption method Plain text Plain text Encryption key Decryption Key Cipher text
  • 11. Good Encryption System: Features Short Key Strong Algorithm High work factor Low error propagation
  • 12. Encryption Building confidentiality and trust into networked transactions. CHANGING THE WAY OF DOING BUSINESS
  • 13. A MATTER OF TRUST Building Trust: Direct trust relationship Using Encryption
  • 14. Some every day transactions: Why do we place trust in these transactions? Authentication Confidentiality Integrity Non-repudiation Credit Card Contract Notarized Notarized Document Medical Records
  • 15. Ways of Encryption Two ways of encryption Symmetric Key or Private Key Encryption Asymmetric Key or Public Key Encryption (abbreviated as PKI)
  • 16. Symmetric Cryptosystem Also called private key infrastructure Cleartext Message Cipher Text Cleartext Message DES | RC4 DES | RC4 Four score and seven years ago, our forefathers brought forth the proposition Four score and seven years ago, our forefathers brought forth the proposition sdfklj98a475$56jhgv98456vjnf84576FGHH78lfkghj-506#6lkjg4#$5;lkn;t7;lsk%0
  • 17. Symmetric Cryptosystem Similar key is used for encryption and decryption Both parties should know the same key Also called private key infrastructure Secured transmission of encryption key to other person is a problem . Original Message Original Message Encrypted Message Encrypted Message
  • 18. Asymmetric Cryptosystem Also called Public Key Infrastructure (PKI) Improvement over Private Key System Provides all elements expected from a secure transaction : Authentication Confidentiality Integrity Non-repudiation Accordingly generates : Signed message Secret message Signed and Secret message
  • 19. Public Key System One half of a key pair is used to encrypt, the other half is used to decrypt. Encryption Recipient’s Public Key Recipient’s Private Key Decryption
  • 20. Public Key Infrastructure(PKI) Uses a pair of keys. One part of pair is used for encryption Another part is used for decryption One part is kept private (called private key of a person) and another is made public (called public key of a person) Any key (public or private) can be used for encryption and then another is used for decryption Same key can not be used for encryption and decryption both. There has to be combination of both keys. Basic Methodology
  • 21. Public Key Infrastructure(PKI) To generate a secret message Message is encrypted by sender with Receiver’s public key and It is decrypted by receiver with his private key. How messages are generated Confidentiality Integrity It ensures : Original Message Encrypted Message Receiver’s public key Encrypted Message Original Message Receiver’s private key Encryption Decryption
  • 22. Public Key Infrastructure(PKI) To generate a signed message Message is encrypted by sender with Sender’s private key and It is decrypted by receiver with Sender’s public key. How messages are generated Authentication Non Repudiation It ensures : Original Message Encrypted Message Sender’s private key Encrypted Message Original Message Sender’s public key Encryption Decryption
  • 23. Asymmetric Cryptosystem To generate a signed and secret message : Message is first encrypted by sender with Sender’s private key. This encrypted message is again encrypted with Receiver’s public key It is decrypted by receiver first with his private key and then with sender’s public key. How messages are generated It ensures : Authentication Non Repudiation Integrity Confidentiality Original Message Encrypted Message I Sender’s private key Encrypted Message II Receiver’s public key Encrypted Message II Encrypted Message I Original Message Sender’s public key Receiver’s private key
  • 24. Digital Signatures Digital signatures are hash code of a document encrypted with sender’s private key. For sending the message, first hash code of message is generated. This hash code is encrypted using sender’s private key. The message is sent along with encrypted hash code. At other end, receiver decrypts hash code with sender’s public key. He also on his own calculates hash code of the message received. Two hash codes should tally. Authentication It ensures : Non Repudiation Integrity Basic Methodology
  • 25. Digital Signatures In earlier process, message has been sent in clear text form thus confidentiality has not been achieved. To overcome this problem, message and encrypted hash code may be encrypted by a symmetric key. This symmetric key is also then encrypted with receiver’s public key. All these i.e. Message and encrypted hash code which are now encrypted with symmetric key and symmetric key itself which is now encrypted with receiver’s public key, are sent to receiver. Receiver first decrypt the symmetric key with his private key and then decrypt message and hash code with this symmetric key.
  • 26. How does PKI work? Original Message Encrypted & Signed Sender’s Private Key Hash Code Digital Signature Symmetric Key Recipient’s Public Key Encrypted Symmetric Key Sender Original Message
  • 27. How does PKI work? Encrypted & Signed Symmetric Key Encrypted Symmetric Key Recipient’s Private Key Original Message Hash Algorithm Hash Code Digital Signature Sender’s Public Key Message verified Recipient
  • 28. Digital Certificate Certificate ties a participant to public key The authenticity of the certificate is guaranteed by the digital signature generated using the CA’s private key. Validity Period Expires: 31 December 2022 Public Key: Signed: CA’s Signature Name: Prashant Mali Number: 2564567A ID Number & Name A Digital Certificate is a digitally signed document that associates a public key with a user. private
  • 29. Key Lifecycle Management Key Generation Certificate Issuance Key Usage or Certificate Validation Key Expiry Key Update
  • 30. Encryption Standard Data Encryption standard A short key, strong algorithm system Uses a 64 bit key, 56 bits for algorithm and 8 bits are parity RSA (Rivest, Shamir, Adalman) Public key system. Once private key is used to encrypt, it can be decrypted only using its public key and vice-versa.
  • 31. Thank You Questions Contact: prashant . [email_address] cyberlawconsulting @gmail.com Cell: 9821763157