Digital Signature Full Seminar Report Download
#20
SmileSmileBig Grin
(29-03-2011, 02:21 PM)seminar class Wrote: Presented by :
SNIGDHA ADHIKARY


Why do we need Digital Signature ???
 A MAC can provide message integrity and message authentication.
 MAC has a drawback. It needs a symmetric key that must be establish between the sender and the receiver.
 A digital signature on the other hand, can use a pair of asymmetric key (one public and a private key).
What is Digital signature ???
 A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document.
 A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and was not altered in transit.
 Digital signatures are commonly used for software distribution, financial transactions, and in cases where it is important to detect forgery and tampering .
Various methods of employing Digital Signature:-
 Using asymmetric –key Cipher.
 Using Keyed Hash function.
Public key Cryptography
• Public-key cryptography involves the use of asymmetric key algorithms.
• Asymmetric key algorithms used to create a mathematically related key pair.
• A secret Private key and a published Public key.
• Protects the confidentiality and integrity of a message.
• The message is Encrypted using the Public key, which can only be Decrypted using the Private key.
Digital Signature using Keyed Hash Function:
The electronics/equivalent of the document and finger print pair is the message and digest pair. To preserve the integrity of a message. The message is passed through an algorithm, called hash function.
The hashed function creates a compressed image of the message that can be used as a fingerprint.
 For compatibility.
 For integrity.
 For efficiency.
Cryptographic protocol
 Cryptographic protocol or Encryption protocol is an abstract or concrete protocol performing a security-related function and applies cryptographic methods. A cryptographic protocol usually incorporates at least some of these aspects:
 Key agreement or establishment.
 Entity authentication.
 Symmetric encryption and message authentication material construction.
 Secured application-level data transport.
 Non-repudiation methods.
Uses of digital signatures
1. Authentication.
2. Integrity .
Additional security precautions:-
1. Putting the private key on a smart card.
2. Using smart card readers with a separate keyboard.
3. Other smart card designs.
4. Using digital signatures only with trusted applications.
FUTURE SCENARIO
 Digital encryption of data is useful during storage and retrieval of medical history of patients involved in e-Health programs.
 The growth of e-commerce and the recent enactment of the Electronic Signatures in Global and National Commerce Act (E-Sign Act) has opened a new frontier.
 With this constant development key management is becoming an issue.
 Advancements in HotJava and JavaPlugin based technologies will maintain fluidity and flexibility in key management.


hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: electronic signature seminar, abstract for digital signature in report, authentication and assurance of data integrity in e commerce, digital signature abstract download, http seminarprojects org t digital signature full seminar report download, digital signature seminar report pdf, seminar report on digital signature doc,
Popular Searches: digital signature scope, future scope of digital signature, digital signature document, sending mail using digital signature project abstract, electronic digital signature wiki, signature announcements, electronic signature seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Digital Signature Full Seminar Report Download - by [email protected] - 15-09-2015, 01:51 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,962 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,833 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,990 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,706 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,089 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,237 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,510 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,645 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Multi signature smart paper boy 2 2,095 11-01-2016, 02:00 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 39,914 16-09-2015, 02:18 PM
Last Post: seminar report asees

Forum Jump: