The process & validity behind Digital Signature technology.
system that uses two keys, a public key known to everyone and a private key, the
private key has full control to the key owner, and has to keep in secured environment.
A unique element to the public key system is that the public and private keys are
related in such a way that only the public key can be used to encrypt messages and
only the corresponding private key can be used to decrypt them. Moreover, it is
virtually impossible to deduce the private key if you know the public key.
When David wants to send a secure message to Donna, he uses Jane's public key to
encrypt the message. Donna then uses her private key to decrypt it.
Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman.
It is also called asymmetric encryption because it uses two keys instead of one
key (symmetric encryption).
Using David and Donna, we can demonstrate how digital signatures are work.
From David’s point of view, the signing process operation is simple. But few steps
are happening while signing process is started. :
Step 1: Generating a Private and Public
Added the signature to the document – The hash result and the user’s digital
certificate that includes user’s Public Key are mixed into a digital signature;
it’s done by using the user’s Private Key to encrypt the document hash. The resulting
signature is unique to both the document and the user. Finally, the digital signature
is embedded to the document.
David sends the signed document to Donna. Donna uses David’s public key (which is
included in the signature within the Digital Certificate) to authenticate David’s
signature and to ensure the document didn’t alter after it was signed.
Please log back in to continue using Secured Signing
Please click here
to contact Secured Signing