Digital signature: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
mNo edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
{{TOC|right}} | {{TOC|right}} | ||
'''Digital signatures''' provide [[information security#source authentication|source authentication]] for online documents, messages or records, in a manner analogous to what a signature provides for a paper document. | '''Digital signatures''' provide [[information security#source authentication|source authentication]] for online documents, messages or records, in a manner analogous to what a signature provides for a paper document. | ||
Line 25: | Line 25: | ||
==References== | ==References== | ||
{{Reflist|2}} | {{Reflist|2}}[[Category:Suggestion Bot Tag]] |
Latest revision as of 11:00, 7 August 2024
This article may be deleted soon. | ||
---|---|---|
Digital signatures provide source authentication for online documents, messages or records, in a manner analogous to what a signature provides for a paper document. Two cryptographic techniques are used together to produce a digital signature, a cryptographic hash and a public key cryptosystem. The steps for the sender are as follows:
Steps for the receiver are:
If both the hash and the public key system used are secure, and no-one except the sender knows his private key, then the signatures are trustworthy. The use of digital signatures raises legal issues. There is an online reference [1] for laws around the world. References
|