Understanding digital signatures

Understanding digital signatures

What is a digital signature, and how can you create one?

What are digital signatures?

Digital signatures are like electronic “fingerprints.” In the form of a coded message, the digital signature securely associates a signer with a document in a recorded transaction. Digital signatures use a standard, accepted format, called Public Key Infrastructure (PKI), to provide the highest levels of security and universal acceptance. They are a specific signature technology implementation of electronic signature (e-Signature).

What’s the difference between a digital signature and an electronic signature?

The broad category of electronic signatures (e-Signatures) encompasses many types of electronic signatures. The category includes digital signatures, which are a specific technology implementation of electronic signatures. Both digital signatures and other e-Signature solutions allow you to sign documents and authenticate the signer. However, there are differences in purpose, technical implementation, geographical use, and legal and cultural acceptance of digital signatures versus other types of e-Signatures.

In particular, the use of digital signature technology for e-Signatures varies significantly between countries that follow open, technology-neutral e-Signature laws, including the United States, United Kingdom, India, Canada, and Australia, and those that follow tiered e-Signature models that prefer locally defined standards that are based on digital signature technology, including many countries in the European Union, South America, and Asia. In addition, some industries also support specific standards that are based on digital signature technology.

How do digital signatures work?

Digital signatures, like handwritten signatures, are unique to each signer. Digital signature solution providers, follow a specific protocol, called PKI. PKI requires the provider to use a mathematical algorithm to generate two long numbers, called keys. One key is public, and one key is private.

When a signer electronically signs a document, the signature is created using the signer’s private key, which is always securely kept by the signer. The mathematical algorithm acts like a cipher, creating data matching the signed document, called a hash, and encrypting that data. The resulting encrypted data is the digital signature. The signature is also marked with the time that the document was signed. If the document changes after signing, the digital signature is invalidated.

To protect the integrity of the signature, PKI requires that the keys be created, conducted, and saved in a secure manner, and often requires the services of a reliable Certificate Authority (CA). Digital signature providers, meet PKI requirements for safe digital signing.




要查看或添加评论,请登录

Sagar A.的更多文章

  • 11 Sentiment Analytics Tools to Track Social Marketing Success!

    11 Sentiment Analytics Tools to Track Social Marketing Success!

    Sentiment analysis, also known as opinion mining, is the analysis of the feelings (i.e.

    2 条评论
  • The Restaurant Owner’s Guide to Choosing A POS System

    The Restaurant Owner’s Guide to Choosing A POS System

    The benefits of having a POS system are straightforward – in a place where tens to hundreds of transactions are made…

    1 条评论
  • CCM can help you “go green”!

    CCM can help you “go green”!

    CCM is the integrated set of solutions to design, deploy, deliver and manage interactions with customers across your…

  • IoT Capabilities Offer New Opportunities!

    IoT Capabilities Offer New Opportunities!

    The Internet of Things (IoT) is the network of physical objects accessed through the Internet—essentially a "Connected…

  • Internet of Things!

    Internet of Things!

    IoT is storming the business world. From smart pills to smart cities, IoT is changing the way people think.

社区洞察

其他会员也浏览了