ttmind

Main Navigation

ttmind
  • jim-jams
  • Tech
  • Positive
Login

Login

Facebook Google

OR

Remember me Forgot password?

Don't have account? Signup here.

Sort by Categorys

.Net

PHP

Java

JavaScript

Database

Server

Client Side

Tools

Artificial Intelligence

Cloud

Hybrid Development

Event

Smart City

Education

Security

Scrum

Digital Marketing

APP Development

Business

Internet

Simulation

Art

Network

Microservices

Architecture

Technology

Leadership

    Top Articles

  • How Does Social Media Bring People Together?
    TTMind Author
  • How to read appSettings JSON from Class Library in ASP.NET Core
    Anil Shrestha
  • Printing Support In Asp.Net Core
    TTMind Author
  • HOW TO EXTRACT TEXT FROM IMAGE USING JAVASCRIPT (OCR with Tesseract.js)?
    Prakash Pokhrel
  • Images Upload REST API using ASP.NET Core
    Prakash Pokhrel
  • Related Topic

  • Differentiate between client-side and server-side validations in Web pages.
  • Log Analysis, How Log Analysis work?, Log analysis methods and its purposes.
  • Is your domain being used by fraudsters to spoof your customers?
  • What is Cyberstalking?
  • Google plus to be shut down
  • Tech
  • About Us
  • Contact Us
  • TechHelp
  • PositiveHelp
  • Jim-Jams Help
  • Terms & Conditions

© Copyright ttmind.com

Main Content

Digital Signature and its working procedures

Security Digital Security about 7 years ago || 8/28/2018 || 3.9 K View

  • Hide

Introduction

Digital Signature is a digitally generated code to identify the ownership of the document while working with digital devices. In another word, it can be defined as the process which guaranteed the content of the message cannot be altered on transit. The signature provided to a content is uniquely identified by a hash key. The hash key is generated by applying algorithm like RSA. RSA is an algorithm used to encrypt and decrypt the content/message by the modern computer. The digital signature also provides assurance of evidence to identify, origin and status of electronic content, message or transaction.


Working Procedures of Digital Signature:
Digital signatures are like a handwritten signature, which are unique to each signer. By implementing the mathematical algorithm, two long encrypted string was generated which are called keys. Those keys are: the public key and private key. Mathematical algorithm act like the cipher, creating data matching the signed document, called a hash, and encrypting that data. output encrypted data is the digital signature. The signature is also marked with the time that the document was signed. The signature is invalid if it was changed after signing.
For example, Party A(Seller) signs an agreement to sell timeshare using the private key. Party B(Buyer) Receives the content. Party B who receive content also receive a copy of party A’s public key. If the public key can’t decrypt the signature using cipher from which the key was created, it means the signature has been changed since it was signed. The signature is then invalid.

  • 2
  • 0
  • 0
    • Facebook
    • Twitter
    • Google +
    • LinkedIn

About author

Prakash Pokhrel

Prakash Pokhrel

https://np.linkedin.com/in/prakash-pokhrel-42a699a2

Reset Your Password
Enter your email address that you used to register. We'll send you an email with your username and a link to reset your password.

Quick Survey