0% found this document useful (0 votes)
10 views

Assignment

What is the biggest problem with the Digital signature?

Uploaded by

Ayesha
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Assignment

What is the biggest problem with the Digital signature?

Uploaded by

Ayesha
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ASSIGNMENT

2.1. What is the biggest problem with the Digital signature?


Explain with your own example.?

The main issue with digital signatures is the possible risk of private key
theft. Unauthorized parties may be able to access private keys used to
create digital signatures, which could result in fraud or unauthorized
access to private data. Maintaining the integrity and reliability of digital
signatures depends on the private key's security
For example: If we are communicating through e-mail using a digital
signature. Your private key, which is used for email signatures if gets
hacked by someone that person will have access to it. That person can
send forged e-mails pretending to be from you. These emails could be
misleading and could potentially damage your company connections or
transactions if they contain requests for private information, incorrect
information, or even cash transactions. For digital signatures to remain
trustworthy and valid in a variety of situations, including email
authentication, the private key must remain secure.

2.2. Explain in detail of the major weakness of the digital


signature?
The major weakness of the digital signature is the possibility of the
private key being hacked. Malicious actors may engage in fraudulent
transactions or spread misleading information if they obtain
unauthorized access to the private key. They can also fake digital
signatures and pretend to be the real signer. Because of this violation,
digital signatures' integrity and reliability are put in danger. This
highlights the vital significance of secure key management procedures,
frequent key rotation, and continuous efforts to combat emerging
cyber security threats.

2.3. Which is the best alternative of Digital signature? Explain


how it overcome the major weakness of the digital signature?
Exploring quantum-resistant cryptographic techniques, such as hash-
based signatures or lattice-based cryptography, is a potential substitute
for conventional digital signatures. The goal of these substitutes is to
improve security, especially in light of possible dangers from quantum
computing. The optimal option is determined by individual
requirements as well as the rapid advancement of technology.
The risk of a potential compromise of the private key in digital
signatures is reduced by quantum-resistant cryptography techniques.
These algorithms improve overall security and protect against major
compromise threats by using mathematical difficulties that are difficult
for both normal and quantum computers to answer, in contrast to
standard methods that are prone to quantum attacks.

2.4. Differentiate between Private key and Symmetric key?


Two essential parts of cryptographic systems, private keys and
symmetric keys, have different functions and traits. Asymmetric, or
public-key, cryptography is linked to private keys. Each entity in this
paradigm is in possession of two keys: a private key that is kept secret
and a public key that is freely disseminated. A secure method of
communication, digital signatures, and identity verification is made
possible by the fact that data encrypted with the public key can only be
unlocked with the matching private key. Asymmetric cryptography is
appropriate in situations where security and identity verification are
critical since it uses more sophisticated algorithms and key
management.
Whereas, on the other hand, symmetric-key cryptography uses
symmetric keys, which use a single key for both encryption and
decryption. Since this method uses fewer resources than asymmetric
cryptography, it can be applied to large scale data encryption tasks like
bulk encrypting files or communication channels. However, since
everyone needs to share the same key, symmetric keys provide a big
difficulty when it comes to secure key distribution. Although symmetric
cryptography is very efficient, there are situations when it may not be
as useful if safe key exchange and personal identity verification are
needed.

You might also like