• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Security » Digital Signatures- What is Digital Signatures?
Next →
← Prev

Digital Signatures- What is Digital Signatures?

By Dinesh Thakur

• Signature is the proof to the receiver that the document comes from the correct entity. The person who signs it takes the responsibility of the content present in the document.

• A signature on a document, when verified, is a sign of authentication; the document is authentic.

• In the networked world, there is a similar need for digital signatures.

•. Authenticating messages using digital signatures requires the following conditions to be met:

1. The receiver should be able to verify the claimed identity of the sender. For example, an imposter may advise a bank to transfer money from the account of another person. The bank should be able to verify the identity of the user before acting on the advice.

2. The sender should not be able to repudiate the contents of the message it sent at a later date. For example, a person having sent advice to transfer money from his account should not be able at later date to repudiate the content of the message sent by him. The bank should be able to prove that he and only he sent the advice and that the contents of message are unaltered.

3. The receiver should not be able to alter the message or concoct the message himself on behalf of the sender. This requirement is important to protect the interests of the sender.

• Some important features of digital signatures are:

1. When a document is signed digitally, signature is sent as a separate document. The receiver receives both documents i.e. the message and the signature and verifies that the signature belongs to the supposed sender.

2. In order to verify the digital signature, the receiver applies the verification technique to the combination of the message and the signature.

3. In digital signature, there is one to one relationship between a signature and a message. Each message has its own signature. The signature of one message cannot be used for another message.

We’ll be covering the following topics in this tutorial:

  • Keys in digital signature
  • Digital signature using Private Key
  • Digital Signature using Private Key and Message Digest

Keys in digital signature

• The sender signs the document using his private key by applying it to a signing algorithm.

• The verifier uses the public key of the signer, applied to the verifying algorithm to verify the document.

Digital signature using Private Key

• Public and private keys possess the property that allows mutual reversal of their roles, i.e. d, the decryption key can be used for encryption and e, the encryption key can be used for decryption. This property can be used for generating messages with digital signature.

• Suppose A encrypts a message using its private key QA and sends it to B.

Digital Signature using Private Key

• Since the message has been encrypted using A’s private key it bears A’s signature on it. B already knows A’s public key PA and decrypts the message received from A.

• The received encrypted message is decrypted using A’s public key. So the message is from A.

• B keeps a copy of the encrypted message so that A cannot refuse sending it.

• B cannot alter the encrypted message or on its own concoct the encrypted message without A’s private key.

• The weakness of this mechanism is that any intruder knowing A’s public key can intercept the message.

• Confidentiality is maintained by second encryption using B’s public key.

Digital Signature using Private Key and Private key

• A encrypts the message to B using its private key first and then using B’s public key.

• B encrypts the received message using its private key and then using A’s public key.

Digital Signature using Private Key and Message Digest

• This method applies private key digital signature to the digest of the message rather than message itself.

• The basic mechanism used is:

1. This message digest, which is much shorter in length than the message, is encrypted using private key of the sender (A).

2. Message digest and the message are sent to other end (B). B computes message digest of the received message part. The encrypted message digest part is decrypted using A’s public key. The received message digest and the computed message digest are compared to ensure they are same.

3. All the requirements of digital signature are met:

(i) The message digest bears A’s signature. Therefore, A cannot repudiate his signature and the contents of the message digest.

(ii) B cannot alter the content of the message because it cannot generate the message digest bearing A’s signature.

You’ll also like:

  1. What is Digital or Electronic Cash or E-cash or Ecash or Digital Money
  2. What is a Digital Signal? Characteristics of Digital Signal
  3. Digital System
  4. What is Digital?
  5. Evolution of Digital Computers
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW