{"id":1593,"date":"2020-11-21T23:53:49","date_gmt":"2020-11-21T23:53:49","guid":{"rendered":"https:\/\/technocript.com\/?p=1593"},"modified":"2022-12-07T18:04:38","modified_gmt":"2022-12-07T18:04:38","slug":"digital-signature","status":"publish","type":"post","link":"https:\/\/technocript.com\/digital-signature\/","title":{"rendered":"E-Signing: Understanding Digital Signature"},"content":{"rendered":"\n<p class=\"tc-snippet\">The digital signature is an authentication mechanism that enables content creators to attach a code to the content. So that this code acts as a signature of the content.<\/p>\n\n\n\n<p>Due to the levels of security and reliability they provide, digital signatures are used as the preferred technology for signing online documents in many industries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Overview\">1. Overview<\/h2>\n\n\n\n<p>The digital signature is an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_signature\" target=\"_blank\" rel=\"noreferrer noopener\">e-signature<\/a> being used to verify both the authenticity and integrity of digital materials. Such as emails, messages, documents, software, etc. <\/p>\n\n\n\n<p>The digital signature cryptographically binds an electronic identity to a digital document using mathematical techniques. It aims at providing the highest level of assurance of the signer&#8217;s identity.<\/p>\n\n\n\n<!-- Ezoic - tc_content_1 - mid_content -->\n<div id=\"ezoic-pub-ad-placeholder-161\"> <\/div>\n<!-- End Ezoic - tc_content_1 - mid_content -->\n\n\n\n<p>The ultimate goal of digital signatures is to ensure three main aspects:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Authentication:<\/strong> the content was created by a known sender. Meaning that the person who created the content is the one who is represented in the signature.<\/li>\n\n\n\n<li><strong>Integrity:<\/strong> the content was not changed or altered during transmission. Meaning that it is exactly how it was when signed by the signer.<\/li>\n\n\n\n<li><strong>Non-repudiation<\/strong>: the entity who signed the content can&#8217;t deny, later, the ownership or validity of the signed content.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Signature-vs-Handwritten-Signature\">2. Digital Signature vs Handwritten Signature<\/h2>\n\n\n\n<p>Theoretically, digital signatures are equivalent to traditional handwritten signatures. Yet, they are modern alternatives to signing documents with paper and pen. <\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"244\" src=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignature_SignHere.jpg\" alt=\"Digital Signature Sign Here\" class=\"wp-image-3736\" srcset=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignature_SignHere.jpg 668w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignature_SignHere-300x110.jpg 300w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>One of the main differences between them is the security and reliability levels provided by the digital form.<\/p>\n\n\n\n<p>However, due to the encryption methodology behind digital signatures, they can&#8217;t be copied to other documents. On the other side, handwritten signatures could be easily replicated between documents. Either by digitally copying the signature image or by manually imitating it on other documents.<\/p>\n\n\n\n<p>Additionally, traditional signatures usually exist only on the first\/last page of the document. Making it fairly easy for other pages to be replaced after the signature is applied. Nevertheless, digital signatures are applied to the entire document. Being able to indicate the tampering or modification of any part of the document content.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Signature-vs-Electronic-Signature-\">3. Digital Signature vs Electronic Signature <\/h2>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_signature\" target=\"_blank\" rel=\"noreferrer noopener\">Electronic signatures<\/a> (or e-signatures) and digital signatures are often used interchangeably, but each one refers to a distinct and relatively different term.<\/p>\n\n\n\n<!-- Ezoic - tc_content_2 - long_content -->\n<div id=\"ezoic-pub-ad-placeholder-162\"> <\/div>\n<!-- End Ezoic - tc_content_2 - long_content -->\n\n\n\n<p>Broadly speaking, e-signatures are the wide umbrella that covers the digital form of handwritten signatures. More specifically, an electronic signature is a legal concept that aims at capturing a person\u2019s intent to be legally bound to an agreement or contract. Thus, the broader term of e-signatures often includes digital signatures.<\/p>\n\n\n\n<p>On the other hand, a digital signature is a specific technique used to implement electronic signatures. It refers to encryption\/decryption technology based on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\" target=\"_blank\" rel=\"noreferrer noopener\">public-key cryptography<\/a>. Thus, a digital signature itself is not an e-signature, it needs to be validated by an e-signing application to secure the e-signed documents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"The-Idea-of-Digital-Signatures\">4. The Idea of Digital Signatures<\/h2>\n\n\n\n<p>The main prenciple behind digital signatures is the usage of a pair of keys called: Public Key and Private Key.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Public-Key-Infrastructure\">4.1. Public Key Infrastructure<\/h3>\n\n\n\n<p>Digital signatures employ a set of standards called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Public Key Infrastructure (PKI)<\/a>. This means each digital signature transaction combines two keys (two pieces of code): a public key and a private key. <\/p>\n\n\n\n<!-- Ezoic - tc_content_3 - longer_content -->\n<div id=\"ezoic-pub-ad-placeholder-163\"> <\/div>\n<!-- End Ezoic - tc_content_3 - longer_content -->\n\n\n\n<p>As its name indicates, the private key must remain private and confidential. It should not be shared with others and is only used to sign the document. <\/p>\n\n\n\n<p>On the other hand, the public key is not confidential and can be shared with all those who need to validate the signature.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"How-Do-Digital-Signatures-Work\">4.2. How Do Digital Signatures Work?<\/h3>\n\n\n\n<p>Using the key pairs, digital signatures prove that the digital content was not modified since it was signed. <\/p>\n\n\n\n<p>To do so, the sender generates a <span style=\"text-decoration: underline;\">unique hash<\/span> of the message or document. This hash is distinctive and tightly related to the content. Changing any part of the content will definitely change the hash. Then, the sender encrypts the generated hash using the sender\u2019s private key.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/LogoHappy.png\" alt=\"Technocript.com Logo Happy\" class=\"wp-image-303\" width=\"173\" height=\"151\" srcset=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/LogoHappy.png 573w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/LogoHappy-300x262.png 300w\" sizes=\"auto, (max-width: 173px) 100vw, 173px\" \/><\/figure>\n<\/div>\n\n\n<p>Afterward, the signed content is sent to the recipient, along with the encrypted hash. <\/p>\n\n\n\n<p>Once received, the recipient re-generates the content hash and decrypts the sender\u2019s hash using the sender\u2019s public key. Then, original and re-generated hash values are compared. If they match, the content was not modified and the sender is authenticated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Signature-Process\">5. Digital Signature Process<\/h2>\n\n\n\n<p>As mentioned before, the digital signature process depends on hashing and encryption mechanisms. Where a pair of public and private keys are used. <\/p>\n\n\n\n<!-- Ezoic - tc_content_4 - longest_content -->\n<div id=\"ezoic-pub-ad-placeholder-164\"> <\/div>\n<!-- End Ezoic - tc_content_4 - longest_content -->\n\n\n\n<p>To clearly explain this mechanism, we describe the individual steps of the entire process.<\/p>\n\n\n\n<p>Let&#8217;s consider this scenario: a sender (S) is sending a document (DOC) to a recipient (R):<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.1. Sender Side:<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Keys Generation:<\/strong> a key generation algorithm randomly generates two unique keys for the sender. A public key (PBK) and a private key (PVK).<\/li>\n\n\n\n<li><strong>Sender Hash Generation:<\/strong> a unique hash (HSH) is generated for the document (DOC). Any modification to the content will modify the hash.<\/li>\n\n\n\n<li><strong>Hash Encryption:<\/strong> the generated hash (HSH) is encrypted using the sender&#8217;s private key (PVK). The resulting hash is (EHSH).<\/li>\n\n\n\n<li><strong>Appending:<\/strong> the encrypted hash (EHSH) and sender&#8217;s public key (PBK) are appended to the document (DOC).<\/li>\n\n\n\n<li><strong>Sending:<\/strong> the message is sent to the recipient (R), which contains the sender&#8217;s document (DOC), sender&#8217;s encrypted hash (EHSH), and sender&#8217;s public key (PBK).<\/li>\n<\/ol>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>At this stage, the document hash which was generated and then encrypted using the sender&#8217;s private key is called the document&#8217;s digital signature.<\/p>\n<\/blockquote>\n\n\n\n<p>The following figure describes the digital signature steps on the sender side.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"298\" src=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_SenderSide.jpg\" alt=\"Digital Signature Process - Sender Side\" class=\"wp-image-3737\" srcset=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_SenderSide.jpg 800w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_SenderSide-300x112.jpg 300w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_SenderSide-768x286.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Digital Signature &#8211; Sender Side<\/figcaption><\/figure>\n<\/div>\n\n\n<!-- Ezoic - tc_content_5 - incontent_5 -->\n<div id=\"ezoic-pub-ad-placeholder-165\"> <\/div>\n<!-- End Ezoic - tc_content_5 - incontent_5 -->\n\n\n\n<h3 class=\"wp-block-heading\">5.2. Recipient Side:<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Receiving:<\/strong> the recipient (R) receives the message with its three elements, assuming no modifications were made to any of them.<\/li>\n\n\n\n<li><strong>Recipient Hash Generation:<\/strong> upon receiving the document (DOC), the recipient re-generates the document&#8217;s hash. The resulting hash is (HSH2).<\/li>\n\n\n\n<li><strong>Hash Decryption:<\/strong> using the sender&#8217;s public key (PBK), the recipient decrypts the received encrypted hash (EHSH). The resulting hash is (HSH).<\/li>\n\n\n\n<li><strong>Hash Comparison:<\/strong> the recipient&#8217;s re-generated hash (HSH2) and the sender&#8217;s decrypted hash (HSH) are compared to each other.<\/li>\n\n\n\n<li><strong>Authenticity Check:<\/strong> if the compared hashes match, the document (DOC) was not altered and it is accepted. Otherwise, modifications have been made to at least one of the three elements, and the entire message is rejected.<\/li>\n<\/ol>\n\n\n\n<p>The following figure describes the digital signature steps on the recipient side.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"310\" src=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_RecipientSide.jpg\" alt=\"Digital Signature Process - Recipient Side\" class=\"wp-image-3738\" srcset=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_RecipientSide.jpg 800w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_RecipientSide-300x116.jpg 300w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalSignatureProcess_RecipientSide-768x298.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Digital Signature &#8211; Recipient Side<\/figcaption><\/figure>\n<\/div>\n\n\n<!-- Ezoic - tc_content_6 - incontent_6 -->\n<div id=\"ezoic-pub-ad-placeholder-166\"> <\/div>\n<!-- End Ezoic - tc_content_6 - incontent_6 -->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Is-Digital-Signature-Legally-Acceptable\">6. Is Digital Signature Legally Acceptable? <\/h2>\n\n\n\n<p>As mentioned before, the digital signature is an implementation of the legal concept of e-signatures. It produces a unique digital fingerprint for a person or entity and uses it to identify digital users and protect their information. <\/p>\n\n\n\n<p>Nowadays, e-signatures are widely accepted as a legal method for digitally signing documents. They are currently the safest and most accepted methods for the legal representation of a digital identity.<\/p>\n\n\n\n<p>Digital signatures are considered&nbsp;legal and hold the same position as traditional handwritten signatures in many regions. Nevertheless, we always recommend seeking independent professional advice to check if digital signatures are accepted, considering the region and context where they are being used.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Certificate-vs-Digital-Signature\">7. Digital Certificate <strong>vs<\/strong> Digital Signature<\/h2>\n\n\n\n<p>Digital certificates and digital signatures are closely related concepts being used interchangeably. From a technical perspective, digital certificates and digital signatures refer to different things. <\/p>\n\n\n\n<!-- Ezoic - tc_content_7 - incontent_7 -->\n<div id=\"ezoic-pub-ad-placeholder-167\"> <\/div>\n<!-- End Ezoic - tc_content_7 - incontent_7 -->\n\n\n\n<p>The digital signature uses a pair of keys to work. One of them is public and can be shared with any party which needs to validate the signature. Remember that digital signatures are also used to validate the identity of the message, not only if it has been altered on its way.<\/p>\n\n\n\n<p>In this context, <a href=\"https:\/\/www.comodo.com\/resources\/small-business\/digital-certificates.php\">the digital certificate<\/a> (also known as a public-key certificate or&nbsp;identity certificate) is a digital document being used to prove the ownership of the public key. <\/p>\n\n\n\n<p>Hence, once the message is received and successfully validated, the recipient uses the digital certificate to verify the identity of the sender.<\/p>\n\n\n\n<p>A digital certificate often contains:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Public Key Info:<\/strong> details about the public key.<\/li>\n\n\n\n<li><strong>Subject Name:<\/strong> details about the public key owner identity.<\/li>\n\n\n\n<li><strong>Issuer Name:<\/strong> the&nbsp;digital signature&nbsp;of the entity that has issued the certificate, also called Certified Authority (see the next paragraph).<\/li>\n\n\n\n<li><strong>Validity:<\/strong> details about issuance and expiration dates.<\/li>\n\n\n\n<li>Other related information.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"722\" src=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalCertificate_Wikipedia.jpg\" alt=\"Digital Certificate - Wikipedia\" class=\"wp-image-3739\" srcset=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalCertificate_Wikipedia.jpg 725w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalCertificate_Wikipedia-300x300.jpg 300w, https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/DigitalCertificate_Wikipedia-150x150.jpg 150w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><figcaption class=\"wp-element-caption\">Example of a Digital Certificate (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_certificate\" target=\"_blank\" rel=\"noreferrer noopener\">source: Wikipedia<\/a>)<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"Certificate-Authority\">8. <strong>Certificate Authority (CA)<\/strong><\/h2>\n\n\n\n<p>For each digital signature transaction, a pair of public and private keys are used. <a href=\"https:\/\/www.ssl.com\/faqs\/what-is-a-certificate-authority\/\">Certificate Authority (CA)<\/a> is a trusted organization recognized for issuing and maintaining these keys.<\/p>\n\n\n\n<!-- Ezoic - tc_content_8 - incontent_8 -->\n<div id=\"ezoic-pub-ad-placeholder-168\"> <\/div>\n<!-- End Ezoic - tc_content_8 - incontent_8 -->\n\n\n\n<p>That being said, CA&nbsp;is a trusted third party that generates public and private keys and validates the entity identity using the digital certificate.<\/p>\n\n\n\n<p>Once a certificate authority validates an identity, it provides a digital certificate that is digitally signed by this authority. This digital certificate can be used later to verify the person&#8217;s identity associated with the public key.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digital signature is an authentication mechanism that enables content creators to attach a code to the content. So that this code acts as a signature of the content.<br \/>\nDue to the levels of security and reliability they provide, digital signatures are used as the preferred technology for signing online documents in many industries. <a href=\"https:\/\/technocript.com\/digital-signature\/\">Read more &#8230;<\/a><\/p>\n","protected":false},"author":3,"featured_media":5291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[446],"tags":[224,238,232,220,229,230,231,237,227,221,225,226,223,222,228],"class_list":["post-1593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-authentication","tag-decryption","tag-digital-certificate","tag-digital-signature","tag-e-sign","tag-e-signature","tag-electronic-signature","tag-encryption","tag-handwritten-signature","tag-hash","tag-integrity","tag-non-repudiation","tag-private-key","tag-public-key","tag-signature"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>E-Signing: Understanding Digital Signature - Technocript.com<\/title>\n<meta name=\"description\" content=\"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/technocript.com\/digital-signature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"E-Signing: Understanding Digital Signature - Technocript.com\" \/>\n<meta property=\"og:description\" content=\"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/technocript.com\/digital-signature\/\" \/>\n<meta property=\"og:site_name\" content=\"Technocript.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/technocript\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-21T23:53:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-07T18:04:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"528\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Technocript Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@technocript_tc\" \/>\n<meta name=\"twitter:site\" content=\"@technocript_tc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Technocript Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/technocript.com\/digital-signature\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/\"},\"author\":{\"name\":\"Technocript Editor\",\"@id\":\"https:\/\/technocript.com\/#\/schema\/person\/37c2d5686f05277f39e6f8b5743f2744\"},\"headline\":\"E-Signing: Understanding Digital Signature\",\"datePublished\":\"2020-11-21T23:53:49+00:00\",\"dateModified\":\"2022-12-07T18:04:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/\"},\"wordCount\":1448,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/technocript.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg\",\"keywords\":[\"Authentication\",\"Decryption\",\"Digital Certificate\",\"Digital Signature\",\"E-Sign\",\"E-Signature\",\"Electronic Signature\",\"Encryption\",\"Handwritten Signature\",\"Hash\",\"Integrity\",\"Non Repudiation\",\"Private Key\",\"Public Key\",\"Signature\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/technocript.com\/digital-signature\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/technocript.com\/digital-signature\/\",\"url\":\"https:\/\/technocript.com\/digital-signature\/\",\"name\":\"E-Signing: Understanding Digital Signature - Technocript.com\",\"isPartOf\":{\"@id\":\"https:\/\/technocript.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg\",\"datePublished\":\"2020-11-21T23:53:49+00:00\",\"dateModified\":\"2022-12-07T18:04:38+00:00\",\"description\":\"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.\",\"breadcrumb\":{\"@id\":\"https:\/\/technocript.com\/digital-signature\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/technocript.com\/digital-signature\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technocript.com\/digital-signature\/#primaryimage\",\"url\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg\",\"contentUrl\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg\",\"width\":950,\"height\":528,\"caption\":\"FI Digital Signatures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/technocript.com\/digital-signature\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/technocript.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"E-Signing: Understanding Digital Signature\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/technocript.com\/#website\",\"url\":\"https:\/\/technocript.com\/\",\"name\":\"Technocript.com\",\"description\":\"All about technology and beyond ...\",\"publisher\":{\"@id\":\"https:\/\/technocript.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/technocript.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/technocript.com\/#organization\",\"name\":\"Technocript.com\",\"url\":\"https:\/\/technocript.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technocript.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/Logo.png\",\"contentUrl\":\"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/Logo.png\",\"width\":2056,\"height\":690,\"caption\":\"Technocript.com\"},\"image\":{\"@id\":\"https:\/\/technocript.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/technocript\",\"https:\/\/x.com\/technocript_tc\",\"https:\/\/www.instagram.com\/technocript\",\"https:\/\/www.pinterest.com\/technocript\",\"https:\/\/www.youtube.com\/channel\/UCrPgACXWjiRNr9ppreNQlBw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/technocript.com\/#\/schema\/person\/37c2d5686f05277f39e6f8b5743f2744\",\"name\":\"Technocript Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g\",\"caption\":\"Technocript Editor\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"E-Signing: Understanding Digital Signature - Technocript.com","description":"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/technocript.com\/digital-signature\/","og_locale":"en_US","og_type":"article","og_title":"E-Signing: Understanding Digital Signature - Technocript.com","og_description":"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.","og_url":"https:\/\/technocript.com\/digital-signature\/","og_site_name":"Technocript.com","article_publisher":"https:\/\/www.facebook.com\/technocript","article_published_time":"2020-11-21T23:53:49+00:00","article_modified_time":"2022-12-07T18:04:38+00:00","og_image":[{"width":950,"height":528,"url":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","type":"image\/jpeg"}],"author":"Technocript Editor","twitter_card":"summary_large_image","twitter_creator":"@technocript_tc","twitter_site":"@technocript_tc","twitter_misc":{"Written by":"Technocript Editor","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/technocript.com\/digital-signature\/#article","isPartOf":{"@id":"https:\/\/technocript.com\/digital-signature\/"},"author":{"name":"Technocript Editor","@id":"https:\/\/technocript.com\/#\/schema\/person\/37c2d5686f05277f39e6f8b5743f2744"},"headline":"E-Signing: Understanding Digital Signature","datePublished":"2020-11-21T23:53:49+00:00","dateModified":"2022-12-07T18:04:38+00:00","mainEntityOfPage":{"@id":"https:\/\/technocript.com\/digital-signature\/"},"wordCount":1448,"commentCount":2,"publisher":{"@id":"https:\/\/technocript.com\/#organization"},"image":{"@id":"https:\/\/technocript.com\/digital-signature\/#primaryimage"},"thumbnailUrl":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","keywords":["Authentication","Decryption","Digital Certificate","Digital Signature","E-Sign","E-Signature","Electronic Signature","Encryption","Handwritten Signature","Hash","Integrity","Non Repudiation","Private Key","Public Key","Signature"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/technocript.com\/digital-signature\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/technocript.com\/digital-signature\/","url":"https:\/\/technocript.com\/digital-signature\/","name":"E-Signing: Understanding Digital Signature - Technocript.com","isPartOf":{"@id":"https:\/\/technocript.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/technocript.com\/digital-signature\/#primaryimage"},"image":{"@id":"https:\/\/technocript.com\/digital-signature\/#primaryimage"},"thumbnailUrl":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","datePublished":"2020-11-21T23:53:49+00:00","dateModified":"2022-12-07T18:04:38+00:00","description":"We explain in this article the idea of digital signatures and how they work to verify the authenticity and integrity of digital materials.","breadcrumb":{"@id":"https:\/\/technocript.com\/digital-signature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/technocript.com\/digital-signature\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technocript.com\/digital-signature\/#primaryimage","url":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","contentUrl":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","width":950,"height":528,"caption":"FI Digital Signatures"},{"@type":"BreadcrumbList","@id":"https:\/\/technocript.com\/digital-signature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/technocript.com\/"},{"@type":"ListItem","position":2,"name":"E-Signing: Understanding Digital Signature"}]},{"@type":"WebSite","@id":"https:\/\/technocript.com\/#website","url":"https:\/\/technocript.com\/","name":"Technocript.com","description":"All about technology and beyond ...","publisher":{"@id":"https:\/\/technocript.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/technocript.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/technocript.com\/#organization","name":"Technocript.com","url":"https:\/\/technocript.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technocript.com\/#\/schema\/logo\/image\/","url":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/Logo.png","contentUrl":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/04\/Logo.png","width":2056,"height":690,"caption":"Technocript.com"},"image":{"@id":"https:\/\/technocript.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/technocript","https:\/\/x.com\/technocript_tc","https:\/\/www.instagram.com\/technocript","https:\/\/www.pinterest.com\/technocript","https:\/\/www.youtube.com\/channel\/UCrPgACXWjiRNr9ppreNQlBw"]},{"@type":"Person","@id":"https:\/\/technocript.com\/#\/schema\/person\/37c2d5686f05277f39e6f8b5743f2744","name":"Technocript Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec90890008db7bee481b63d6da515c2644b7ee1dbc9427d5066c43f439618c23?s=96&d=mm&r=g","caption":"Technocript Editor"}}]}},"jetpack_featured_media_url":"https:\/\/technocript.com\/wp-content\/uploads\/2020\/11\/FI_DigitalSignatures.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/posts\/1593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/comments?post=1593"}],"version-history":[{"count":5,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/posts\/1593\/revisions"}],"predecessor-version":[{"id":5613,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/posts\/1593\/revisions\/5613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/media\/5291"}],"wp:attachment":[{"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/media?parent=1593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/categories?post=1593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technocript.com\/wp-json\/wp\/v2\/tags?post=1593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}