
If the recipient can't open the document with the signer's public key, that indicates there's a problem with the document or the signature. The only way to decrypt that data is with the signer's public key. For encryption and decryption, the person who creates the digital signature uses a private key to encrypt signature-related data. Using a public key algorithm - such as Rivest-Shamir-Adleman, or RSA - two keys are generated, creating a mathematically linked pair of keys: one private and one public.ĭigital signatures work through public key cryptography's two mutually authenticating cryptographic keys. How do digital signatures work?ĭigital signatures are based on public key cryptography, also known as asymmetric cryptography. In many countries, including the U.S., digital signatures are considered legally binding in the same way as traditional handwritten document signatures. Signers can also use them to acknowledge informed consent. A digital signature is intended to solve the problem of tampering and impersonation in digital communications.ĭigital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. Ben Lutkevich, Technical Features WriterĪ digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software.
