Skip to content


Last week, AI Power and you understood what Digital Signature is. Today, let’s explore how Digital Signature operates.

Digital Signature relies on public key cryptography, also known as asymmetric cryptography. It uses a public key algorithm, such as RSA (Rivest-Shamir-Adleman). Two keys are generated: a public key and a private key.

This technique operates through two interrelated cryptographic keys. The digital signature creator uses the private key to encrypt data related to the signature, while the only way to decrypt the data is by using the registrant’s public key.

If the recipient cannot open the data with the signer’s public key, it indicates an issue with the document or signature. This is the verification process of this technique.

This technique also requires all parties to trust that the individual creating the signature has kept the private key secret. If someone gains access to the private key, they can create a fraudulent digital signature on behalf of the private key owner.


Source: Admin compilation