Digital Signature in CYBER SECURITY
Digital Signature in CYBER SECURITY
Digital Signature in CYBER SECURITY
Authentication
Authentication is a process which verifies the identity of a user who wants to access
the system. In the digital signature, authentication helps to authenticate the
sources of messages.
Non-repudiation
Non-repudiation means assurance of something that cannot be denied. It ensures
that someone to a contract or communication cannot later deny the authenticity of
their signature on a document or in a file or the sending of a message that they
originated.
Integrity
Integrity ensures that the message is real, accurate and safeguards from
unauthorized user modification during the transmission.
2|P ag e
The key generation algorithm selects private key randomly from a set of possible
private keys. This algorithm provides the private key and its corresponding public
key.
2. Signing algorithm
The user who is creating the digital signature uses their own private key to encrypt
the signature-related document. There is only one way to decrypt that document is
with the use of signer's public key.
This technology requires all the parties to trust that the individual who creates the
signature has been able to keep their private key secret. If someone has access the
signer's private key, there is a possibility that they could create fraudulent
signatures in the name of the private key holder.
3. Now, the original message or file content along with the digital signature is
transmitted.
4. The receiver decrypts the digital signature by using a public key of a sender.
5. The receiver now has the message or file content and can compute it.
6. Comparing these computed message or file content with the original
computed message. The comparison needs to be the same for ensuring
integrity.
Certified Signatures
The certified digital signature documents display a unique blue ribbon across the
top of the document. The certified signature contains the name of the document
signer and the certificate issuer which indicate the authorship and authenticity of
the document.
Approval Signatures
The approval digital signatures on a document can be used in the organization's
business workflow. They help to optimize the organization's approval procedure.
The procedure involves capturing approvals made by us and other individuals and
4|P ag e
embedding them within the PDF document. The approval signatures to include
details such as an image of our physical signature, location, date, and official seal.
Digital signatures work by proving that a digital message or document was not
modified—intentionally or unintentionally—from the time it was signed. Digital
signatures do this by generating a unique hash of the message or document and
encrypting it using the sender's private key. The hash generated is unique to the
message or document, and changing any part of it will completely change the hash.
Once completed, the message or digital document is digitally signed and sent to the
recipient. The recipient then generates their own hash of the message or digital
document and decrypts the sender's hash (included in the original message) using
the sender's public key. The recipient compares the hash they generate against the
sender's decrypted hash; if they match, the message or digital document has not
been modified and the sender is authenticated.
Through the use of a trusted third party, digital signatures can be used to identify
and verify individuals and ensure the integrity of the message.
As paperless, online interactions are used more widely, digital signatures can help
you secure and safeguard the integrity of your data. By understanding and using
digital signatures, you can better protect your information, documents, and
transactions.
7|P ag e
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity
and integrity of a message, software, or digital document.
3. Receiver decrypts the digital signature using the public key of sender.(This
assures authenticity, as only sender has his private key so only sender can
encrypt using his private key which can thus be decrypted by sender’s public
key).
4. The receiver now has the message digest.
5. The receiver can compute the message digest from the message (actual
message is sent with the digital signature).
6. The message digest computed by receiver and the message digest (got by
decryption on digital signature) need to be same for ensuring integrity.
Message digest is computed using one-way hash function, i.e. a hash function in
which computation of hash value of a message is easy but computation of the
message from hash value of the message is very difficult.
Digital Certificate
Digital certificate is issued by a trusted third party which proves sender’s identity
to the receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify
the identity of the certificate holder. Digital certificate is used to attach public key
with a particular individual or an entity.
10 | P a g e
Weak encryption: Older digital certificate systems may employ less secure
encryption methods that are open to intrusions.
Electronic Signature
Electronic Signature is a digital form of a wet ink signature which is legally
binding and secure but it does not incorporate any coding or standards. It can be
a symbol, image, process attached to the message or document to recognize the
identity and to give consent on it. When we need to only verify the document we
use electronic signature. The validation of electronic signature is not performed
by any trusted certificate authorities or trust service providers so it is not usually
authorized. Electronic signature is very easy to use than digital signature but it is
less secured and less authentic than digital signature.
Advantages:
Convenience: Electronic signatures can be signed remotely from any location,
making it easier for individuals and businesses to sign documents without
having to be physically present.
Time-saving: Electronic signatures can be signed instantly, saving time
compared to traditional paper signatures that require mailing, scanning, or
faxing.
Cost-effective: Electronic signatures can save businesses money on paper, ink,
postage, and storage costs.
Security: Electronic signatures can be secured using encryption and
authentication protocols, making it difficult for unauthorized persons to access
the signature.
Disadvantages:
Legal recognition: Electronic signatures may not be legally recognized in all
countries, making it important to check the laws and regulations in the
relevant jurisdiction.
Technical issues: Electronic signatures can be vulnerable to technical issues,
such as system failures, power outages, and hacking attacks.
Dependence on technology: Electronic signatures require the use of
technology, such as computers and internet connections, which can be a
disadvantage in areas with limited technological infrastructure.
Similarities:
Both are used to sign electronic documents and authenticate the identity of the
signer.
Both are alternatives to traditional ink signatures on paper documents.
13 | P a g e
Both can be used for remote signing, allowing individuals and businesses to
sign documents from any location.
Both can save time and money compared to traditional paper-based
signatures.
Both can be secured using encryption and authentication protocols, providing
a level of security to the signature.
Both can be used to comply with legal requirements for signing documents in
various jurisdictions.
Both can be used for a wide range of applications, including business contracts,
financial transactions, and legal documents.
Both have become increasingly popular in the digital age, as more and more
transactions and communications are conducted online.
Both can be used to verify the integrity and authenticity of the signed
document.
Both can help to reduce the risk of fraud and unauthorized access to signed
documents.