CLICK HERE TO DOWNLOAD PPT ON DIGITAL SIGNATURE
Digital Signatures Presentation Transcript
1.Digital Signatures
2.Public Key Infrastructure
Meeting legal Requirement
-Privacy: Only intended recipient can read the files
-Integrity: Guarantees files are unaltered during
transmission
-Authentication: Ensures that parties involved are
who they claim to be -Non-repudation: Prevents individuals from denying
involvement in a transaction.
Meeting legal Requirement
-Privacy: Only intended recipient can read the files
-Integrity: Guarantees files are unaltered during
transmission
-Authentication: Ensures that parties involved are
who they claim to be -Non-repudation: Prevents individuals from denying
involvement in a transaction.
3.PKI Applications
E-mail with customers, partners and Employees
e-Commerce including data exchange and financial transactions.
Digital contract including loans, leases and Mortgages.
Remote Access to corporate databases.
E-mail with customers, partners and Employees
e-Commerce including data exchange and financial transactions.
Digital contract including loans, leases and Mortgages.
Remote Access to corporate databases.
4.The components of PKI
Encryption using Public Key & secret key
-Hybrid Approach
Digital Signature Process
Transporting Encryption Keys
Digital Certificates
Message Decryption and Verification
Encryption using Public Key & secret key
-Hybrid Approach
Digital Signature Process
Transporting Encryption Keys
Digital Certificates
Message Decryption and Verification
5.X.509 Digital Certificate
6.The Certification Process
Subscriber applies to CA for Digital Certificates.
CA Verifies the subscriber’s identity and issues digital certificates.
CA publishes certificates to public on-line repository
Subscriber signs message with private key & sends message to second party.
Receiving party verifies digital signature with sender’s public key.
CA reports status of subscriber’ certificates.
Subscriber applies to CA for Digital Certificates.
CA Verifies the subscriber’s identity and issues digital certificates.
CA publishes certificates to public on-line repository
Subscriber signs message with private key & sends message to second party.
Receiving party verifies digital signature with sender’s public key.
CA reports status of subscriber’ certificates.
7.Digital Signature Process Illustrated
8.The Encryption Process
9.Message Decryption and Verification Process
10.Authentication MethodsSmart card VS Token-iKey VS smart card
Biometrics-Finger prints, voice print, Iris patterns, face print
Wireless -Pagers, Cell phones, PDA
Biometrics-Finger prints, voice print, Iris patterns, face print
Wireless -Pagers, Cell phones, PDA
Wow. This presentation covers all about digital signature. I have to submit a presentation on any of the security concepts and this presentation will be of great use to me. I am so excited that I found it.
ReplyDeleteeSignature