Introduction to digital signature seminar Topic:
Digital signature is cryptography method used for converting the data into different form and the data can be read by using a key. The digital signature is authentication process to accept a license on a online interface. Digital signatures are different from electronic signatures and these are based on mathematical algorithms.
The digital signature is a document which is based on the owner’s private key. In this paper we will see how digital signature cryptography algorithms are implemented and how they are transmitted over the network.
Information on digital signature types, key hash algorithm, uses are explained in digital signature power point presentation.
Digital signature conversion process:
The digital signature cryptography process is done by using symmetric cryptography and asymmetric cryptography methods. The messages are converted using a code in which the message is placed in alternative characters and the other way is by using cipher in which the whole message is converted.
In symmetric cryptography process the receiver and sender knows the key which they use for encrypting and decrypting the message. Whereas in asymmetric cryptography process there are two keys present, they are a private key which only the owner knows and the other is the public key which is known by everybody. Direct approach or arbitrated approaches are proposed for obtaining the digital signature function.
Conclusions of digital signature usage:
Digital signatures are used for used in biometric identifiers. The usage of digital signature has been growing in areas of security agencies and in law enforcement and in consumer marketing agencies. This is secure method for performing the license agreements on a online basis.