Home > Today’s Crypto News
bitcoin
bitcoin

$94909.036719 USD

1.86%

ethereum
ethereum

$1805.287443 USD

3.16%

tether
tether

$1.000610 USD

0.02%

xrp
xrp

$2.192939 USD

0.69%

bnb
bnb

$602.949957 USD

0.43%

solana
solana

$151.863311 USD

0.35%

usd-coin
usd-coin

$1.000031 USD

0.01%

dogecoin
dogecoin

$0.187217 USD

4.41%

cardano
cardano

$0.723513 USD

2.30%

tron
tron

$0.243207 USD

-0.10%

sui
sui

$3.617348 USD

8.73%

chainlink
chainlink

$15.150138 USD

2.18%

avalanche
avalanche

$22.760275 USD

3.89%

stellar
stellar

$0.289607 USD

4.92%

shiba-inu
shiba-inu

$0.000015 USD

6.88%

Digital Signature

What Is a Digital Signature?

Digital signatures employ cryptography to provide a way of determining whether a digital message or document is real. 

If a signature is deemed valid, it can be assumed that the communication is from the person it says it's from (known as authentication,) that the sender cannot reasonably deny that the communication is from them (non-repudiation,) and that the communication has not been changed or tampered with (integrity.)

Digital signatures use public key cryptography, in which encryption and decryption is carried out using pairs of public and private keys. As the name suggests, public keys are broadcast publicly, while private keys are kept secret.

To sign a message with a digital signature, the sender uses software to create a hash of the message, which is then encrypted using their private key. To verify a message, the encrypted hash is decrypted using the sender's public key. Then, a second hash of the message is created; if this hash matches the decrypted one, the message is valid.

Digital signatures are not the same as electronic signatures, although the former term is often used to describe the latter technology. 

Electronic signature simply refers to any digital mark that is intended to represent a signature. Common examples of this include HelloSign and Adobe Sign. However, some electronic signature tools may include digital signature technology — meaning an element of public key cryptography may have been used.

Digital signatures are widely used online, for example to authenticate network connections. They are also becoming increasingly common in government. For example, key documents are now published by the U.S. Government Printing Office with accompanying public signatures to verify their authenticity.