Figure 1.4: Encryption-–decryption process
Digital signature
To verify the contents of a document, as also the sender’s identity, a digital
code is generated and authenticated by public key encryption attached to an
electronically transmitted document is a digital signature, a maj or benefit of
public-key cryptography.
To ensure that an electronic document authenticates a digital signature is a
way. By authentic, we mean you know who created the document and that it
has not been altered because that person created it.
To ensure authentication, digital signatures depend on certain types of
encryption. Taking the data that one computer sends to another and
encoding it into a form that only the other computer can decode is the
process called encryption. The information coming from a trusted source is
verified by the process of authentication. These two processes work hand in
hand for digital signatures. Digital signatures enable the recipient of
information to verify the authenticity of the information’s origin, as also
verify that the information is intact.
Authentication, data integrity, and non-repudiation are provided by the
public key digital signatures. The purpose served is the same as a
handwritten signature.
Counterfeiting digital signatures is nearly impossible, although in the case
of handwritten signatures, it may be possible. Attesting to the contents of
the information and to the identity of the signer is made possible by the
digital signature.
Figure 1.5 explains the process of digital signature.