You are on page 1of 2

As the name itself implies, a Digital Signature is a type of signature, but the only difference is

that it involves the use of mathematical pin or algorithm to sign and validate the authenticity of a
document, file or software instead of pen and paper.

A digital signature is used to make sure that the file(s) sent digitally belongs to a designated
source and reaches the intended receiver in its original format without any tampering. In simple
terms, a digital signature works in the same way as an envelope seal does.

It uses an advanced mathematical technique to check the authenticity and integrity of digital
messages and documents. It guarantees that the contents of a message are not altered in transit
and helps us overcome the problem of impersonation and tampering in digital communications.

Digital signatures also provide additional information such as the origin of the message, status,
and consent by the signer.

Public key

Public key infrastructure (PKI) is a set of software, hardware, and procedures required to
securely manage digital signatures. Each digital signature transaction includes a pair of keys: a
public key and a private key. The public key will be made available to all those who need to
validate the signer's e-signature. The private key is not shared with others and will be only used
by the signer to e-sign documents.
certificate authority

For each digital signature transaction, we require a public and private key. Those keys should be
protected to avoid tampering of digitally signed documents. Certificate authorities are the
industry-trusted organizations that are widely recognized for ensuring key security and digital
certificates.
How does a Digital Signature Work?

Digital signatures are based on Public Key infrastructure. By this mechanism, two keys are
generated, a Public Key and Private Key. The private key is kept by the signer and it should be
kept securely. On the other hand, the receiver must have the public key to decrypt the message.

To create a digital signature, the content of the document being signed is used to create a very
long unique number called a hash. The hash code is unique to the document, and it records what
the document looked like at the time of signing. Think of it like a fingerprint for the document.
The hash code is then encrypted using the signer’s private key (a code that only the signer can
access), and the encrypted hash becomes the digital signature. The identity of the signer, the
nature of the document when it was signed and the digital signature itself are permanently
embedded into the document.

You might also like