Professional Documents
Culture Documents
Digital Signature
Learning Objectives
Signature and the Law What is Digital Signature Technology How Digital Signature Technology works? Public Key Certificates What is Digital Certificates? Challenges and opportunities
In simple term, signature recognizes any mark made with the intention of authenticating the marked document.
Efficiency and logisticsdescribes the sense of clarity and finality to the transaction.
Signature Attributes
Signer Authentication A signature identifies the person and authorizes the message. Document Authentication - A signature identifies what is signed without detection and even marking the impracticable to falsify. Signature and Document Authentication is known a s n o n r e p u d i a t i o n s e r v i c e . A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the d a t a h a s
100hrs Information Technology Training Board of Studies, ICAI
Signature Attributes
been received, or to protect the recipient against false denial by the sender that the data has been sent. Affirmative Act: - define the ceremonial and approval functions or a signature. Efficiency: - describes the authentication process with the least possible expenditure of resources.
Integrity :The sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. However, if a message is digitally signed, any change in the message will invalidate the signature.
A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed size bit string the hash value, such that an accidental change to the data will change the hash value. The data to be encoded is often called the message d i g e s t o r s i m p l y d i g e s t .
100hrs Information Technology Training Board of Studies, ICAI
Developer certificates authenticate software and assure the user while downloading the software f r o m t h e I n t e r n e t . Personal certificates are used by individual when they exchange message with other users or online services. It allows to validate a website visitors identity and even restrict their access to certain p o r t i o n s o f t h e w e b s i t e .
100hrs Information Technology Training Board of Studies, ICAI
Message is captured. Hash value of the message is calculated. Sender's private key is retrieved from the sender's digital certificate. Hash value is encrypted with the sender's private key.
100hrs Information Technology Training Board of Studies, ICAI
Advantages
Minimizing the risk of dealing with imposters Message integrity Formal legal requirement High degree of information security
100hrs Information Technology Training Board of Studies, ICAI
Thank You