Figure 1.4: Encryption-–decryption process

Digital signature

To verify the contents of a document, as also the sender’s identity, a digital

code is generated and authenticated by public key encryption attached to an

electronically transmitted document is a digital signature, a maj or benefit of

public-key cryptography.

To ensure that an electronic document authenticates a digital signature is a

way. By authentic, we mean you know who created the document and that it

has not been altered because that person created it.

To ensure authentication, digital signatures depend on certain types of

encryption. Taking the data that one computer sends to another and

encoding it into a form that only the other computer can decode is the

process called encryption. The information coming from a trusted source is

verified by the process of authentication. These two processes work hand in

hand for digital signatures. Digital signatures enable the recipient of

information to verify the authenticity of the information’s origin, as also

verify that the information is intact.

Authentication, data integrity, and non-repudiation are provided by the

public key digital signatures. The purpose served is the same as a

handwritten signature.

Counterfeiting digital signatures is nearly impossible, although in the case

of handwritten signatures, it may be possible. Attesting to the contents of

the information and to the identity of the signer is made possible by the

digital signature.

Figure 1.5 explains the process of digital signature.