Computer Security

Computer Security
Slide Note
Embed
Share

Delve into the world of digital signatures with a focus on their significance, the process involved, and the security they offer. Explore differences between conventional and digital signatures, understand the need for key management in digital signature processes, and grasp the applications and vulnerabilities associated with this cryptographic technique.

  • Digital signature
  • Security
  • Process
  • Encryption
  • Cryptography

Uploaded on Mar 02, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Computer Security CMPE 435 Semester II 2017 - 2018 Dr. Saman Mirza Abdullah saman.mirza@ishik.edu.iq

  2. Class Objectives To define digital signature. To define security services provided by a digital signature. To define attacks on digital signatures. To discuss a digital signature scheme, RSA To describe some applications of digital signature. Computer Security - Ishik 3/2/2025 2

  3. Introduction We are familiar with the concept of a signature before. A person signs a document to show that it originated from him or was approved by him. The signature is proof to the recipient that the document comes from the correct entity and nobody else. A sign of authentication: A verified signature on a document. A message can be signed electronically. The electronic signature can prove the authenticity of the sender of the message digital signature Computer Security - Ishik 3/2/2025 3

  4. Comparison Conventional Signature Digital Signature (1) Inclusion Included in the document as part of the document. Send the signature as a separate document. (2) Verification Method Recipient compares the signature on the document with the signature on file. The recipient receives the message and the signature. The recipient needs to apply a verification technique to the combination of the message and the signature to verify the authenticity. (3) Relationship Normally a one-to-many relationship between a signature and documents. One-to-one relationship between a signature and a message. Duplicity A copy of the signed document can be distinguished from the original one on file. No such distinction unless there is a factor of time on the document Computer Security - Ishik 3/2/2025 4

  5. Process of Digital Signature Computer Security - Ishik 3/2/2025 5

  6. Process of Digital Signature Computer Security - Ishik 3/2/2025 6

  7. Digital Signature Process Need of Key Computer Security - Ishik 3/2/2025 7

  8. Process of Digital Signature Long Message Asymmetric key used for small size of message. Hash function used to reduce the size of message. Digest message is used for digital signature process. Computer Security - Ishik 3/2/2025 8

  9. Note Computer Security - Ishik 3/2/2025 9

  10. Digital Signature Services Computer Security - Ishik 3/2/2025 10

  11. Authentication and Integrtiy Computer Security - Ishik 3/2/2025 11

  12. Digital Signature Trusted Center Computer Security - Ishik 3/2/2025 12

  13. Digital Signature Process Computer Security - Ishik 3/2/2025 13

  14. RSA Digital Signature Computer Security - Ishik 3/2/2025 14

  15. Digital Signature Scheme Computer Security - Ishik 3/2/2025 15

  16. Digital Signature on Digest Message Computer Security - Ishik 3/2/2025 16

  17. RSA Digital Signature Example Bob wants to send a message (9) to Alice as a digital signature. All details about public and private keys are given below: Bob (5,65) (29,65) Alice (3,33) (7,33) Public Key Private Key Computer Security - Ishik 3/2/2025 17

  18. Class End Computer Security - Ishik 3/2/2025 18

More Related Content