You are on page 1of 11

D1IM2451A

NIK MOHAMAD FADHIL BIN HALIM


2013322307
MOHAMAD AMIR IHSAN BIN ADNAN
2013106789
MOHD SABIRIN BIN ANUAR
2013942095
MUHAMMAD FAWWAZ BIN ABDUL RAHMAN
2013359799

To ensure secured connection between


two transactional parties.
Security and commitment are key
issues for commercial online
transactions, such as identity, legal
commitment, third party interference
and manipulation of information.

"digital signature" means a transformation of


a message using an asymmetric
cryptosystem such that a person having the
initial message and the signer's public key
can accurately determine(a)
whether the transformation was
created
using the private key that
corresponds to the
signer's public key and
(b)
whether the message has been
altered since
the transformation was
made;

A valid digital signature gives a recipient


reason to believe that the message was
created by a known sender, and that it
was not altered in transit.
Digital signatures are commonly used
for software distribution, financial
transactions, and in other cases where it
is important to detect forgery or
tampering.

The Digital Signature Act was enforced


on the 1st October 1998
The Digital Signature Act 1997 aims at
promoting the processing of transaction
especially commercial transaction,
electronically through the use of digital
signatures

To do email encryption, the very beginning is to make


sure your email have an add-on encryption feature.
For an email encryption, there are 3 components
which are used during the process:
1) Public key - is a key given to everyone who want
to send an email to you
2) Passphrase - Yourpassword unlocks your private
key and permits it to be used during read and unlock
yourpublic keyto send and receive encrypted
email.
3) Private key - is a key use to keep your secret on
your computer since it is used for decryption

The keyconsist your name, email and


password, and it is generated by the
software wizard.
Your public keymust be sent to a key
server so thatsender can use it to send
encrypted email to you.
When you received an encrypted email,
youwill be requested to key in the
passphrase to decrypt that emailusing
your private key.

1.

2.

Authentication
Digital signatures can be used to
authenticate the source of
messages.
Integrity
There is verification of the
genuineness of the message.

3.

4.

Non-repudiation
The sender is unable to repudiate the
effect of the signature.
Security
There exists security of the
information sent.

1. SMART card technology is expensivemore cost needed.


2. Standards are necessary-must observe
the standards. if not, the encryption will
fail.
3. Public keys are difficult to manage.public keys are given to everyone who
want to send an email to you.

You might also like