message digest & digital signature

18
Message Digest & Digital Signature. Presented By Lamack Jose (Roll No 16) Dinesh Kodam (Roll No 34) Manoj Patil (Roll No 36)

Upload: dinesh-kodam

Post on 02-Dec-2014

267 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Message digest & digital signature

Message Digest & Digital

Signature.

Presented By Lamack Jose (Roll No 16) Dinesh Kodam (Roll No 34) Manoj Patil (Roll No 36)

Page 2: Message digest & digital signature

Concept of Hash (Message Digest)

2

Page 3: Message digest & digital signature

Concept of Hash (Message Digest)

3

Page 4: Message digest & digital signature

Idea of a Message Digest

4

Page 5: Message digest & digital signature

Idea of a Message Digest

5

Page 6: Message digest & digital signature

Requirement of a Message Digest

6

Page 7: Message digest & digital signature

Message Digest

7

Page 8: Message digest & digital signature

Digital Signatures

[email protected] 8

Page 9: Message digest & digital signature

Digital Signatures

9

Page 10: Message digest & digital signature

Digital Signatures

10

Page 11: Message digest & digital signature

Steps for the process

11

Page 12: Message digest & digital signature

Digital Signatures

12

Page 13: Message digest & digital signature

The Sender’s Side

13

Page 14: Message digest & digital signature

The Receiver’s Side

14

Page 15: Message digest & digital signature

Properties of Digital Signatures • Digital signature does not

provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied.

• Digital signatures can provide 1. Integrity, 2. Authentication, and 3. Nonrepudiation.

15

Page 16: Message digest & digital signature

Properties of Digital Signatures

16

Page 17: Message digest & digital signature

Properties of Digital Signatures 1. Integrity The integrity of a message is

preserved because if Eve intercepted the message and partially or totally changed it, the decrypted message would be unreadable.

2. Authentication We can use the following reasoning to show how a message can be authenticated. If Eve sends a message while pretending that it is coming from Alice, she must use her own private key for encryption. The message is then decrypted with the public key of Alice and will therefore be nonreadable. Encryption with Eve's private key and decryption with Alice's public key result in garbage.

17

Page 18: Message digest & digital signature

Properties of Digital Signatures3. Nonrepudiation Digital signature also provides

for nonrepudiation. Bob saves the message received from Alice. If Alice later denies sending the message, Bob can show that encrypting and decrypting the saved message with Alice's private and public key can create a duplicate of the saved message. Since only Alice knows her private key, she cannot deny sending the message.

18