Digital Signature
Digital Signature
DIGITAL SIGNATURE
Caesar Cipher
The shift is linear and equidistributed
I agree
i+3=l
3 changes lcdjuhh
Space=c [+3]
Key Cipher
The shift is linear (cyclic)
269
mewam3rzjba
k.n.gupta 62
k+2=m (dot)=e [+6] n=w [+9]
Ca hr a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 .( o Dt) Sa e pc
1 b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a
2 c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b
3 d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 .
4 e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 .
5 f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b c d e
6 g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b c d e f
7 h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b c d e f g
8 i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b c d e f g h
9 j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 . a b c d e f g h i
a a b b c c d
ENCRYPTION
Message 1
Central to the growth of e-commerce and egovernance is the issue of trust in electronic environment.
DECRYPTION
Encrypted Message 1 Message 1
9a46894335be49f0b9cab28d755aaa9cd98571b 275bbb0adb405e6931e856ca3e5e569edd13528 5482 Central to the growth of e-commerce and egovernance is the issue of trust in electronic environment.
Encrypted Message 1
Message 2
The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.
SYMMETRIC
Same Key
Encrypted Message 2
Encrypted Message 2
a520eecb61a770f947ca856cd675463f1c95a 9a2b8d4e6a71f80830c87f5715f5f59334978 dd7e97da0707b48a1138d77ced56feba2b46 7c398683c7dbeb86b854f120606a7ae1ed93 4f5703672adab0d7be66dccde1a763c736cb 9001d0731d541106f50bb7e54240c40ba780 [Keys of a pair Public and Private] b7a553bea570b99c9ab3df13d75f8ccfdddea af3a749fd1411
Message 2
Different Keys
ASYMMETRIC [PKI]
The Internet knows no geographical boundaries. It has redefined time and space. Advances in computer and telecommunication technologies have led to the explosive growth of the Internet. This in turn is affecting the methods of communication, work, study, education, interaction, leisure, health, governance, trade and commerce.
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
These are digital signatures of same person on different documents
Digital Signatures are numbers Same Length 40 digits They are document content dependent
Digital Signatures
[Public key known to everyone & Private key only to the owner]
Private Key Used for making digital signature Public Key Used to verify the digital signature
Signed Messages
Message Message
Message Message ++ signature signature Hash Hash
Signatures verified
OK
if
SIGN hash SIGN hash With Senders With Senders Private key Private key
Hash Hash Decrypt Decrypt Signature Signature With Senders With Senders Public Key Public Key
Sender
Receiver
Signature Signature depends independent of the on the contents of document the document
Nonrepudiation
a. b.
Paper
IDRBT Certificate
Electronic
Safescrypt
5th Feb 2002 A subsidiary of Satyam Infoway
Charges of certificates varies from Rs. 500/- to Rs. 20,000/- per year
Applications in Judiciary
1. Instant posting of judgment on the web. 1. Secured electronic communications within judiciary 1. Authentic archiving of Judicial records 1. Submission of affidavits 1. Giving certified copies of the Judgment
A.
Subscribers
Subscribers services management
STD/ISD, Opening, Closing, Initializing Password
Shifting of telephones, Accessories (Clip, Cordless) Small Payments through telephones bills
Books, gifts, Internet purchases
B.
Internal
Intra/Inter offices authentic communications
OBs, approvals, Instructions, requests
Procurement of material
Calling/Receiving bids, Purchase orders, Payment instructions Change of configuration, Blocking/unblocking routes
What
I discussed so far ,these are only the abstract views of digital signature, But in realistic world, digital signature technique is very hard to implement . So being a software professionals we should aware of the minimum knowledge regarding digital signature. Because it will help us in future if any body have an aim to study digital signature in more advance form