digital signature

(redirected from signed document)
Also found in: Dictionary, Medical.

digital signature

[′dij·əd·əl ′sig·nə·chər]
(communications)
A set of alphabetic or numeric characters used to authenticate a cryptographic message by ensuring that the sender cannot later disavow the message, the receiver cannot forge the message or signature, and the receiver can prove to others that the contents of the message are genuine and originated with the sender.

digital signature

(cryptography)
Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption.

The sender uses a one-way hash function to generate a hash-code of about 32 bits from the message data. He then encrypts the hash-code with his private key. The receiver recomputes the hash-code from the data and decrypts the received hash with the sender's public key. If the two hash-codes are equal, the receiver can be sure that data has not been corrupted and that it came from the given sender.

digital signature

A digital guarantee that information has not been modified, as if it were protected by a tamper-proof seal that is broken if the content were altered. The two major applications of digital signatures are for setting up a secure connection to a website and verifying the integrity of files transmitted (more below).

An Encrypted Digest
The digital signature is an encrypted digest of the file (message, document, driver, program) being signed. The digest is computed from the contents of the file by a one-way hash function, such as MD5 and SHA-1, and then encrypted with the private part of a public/private key pair (see RSA). To prove that the file was not tampered with, the recipient uses the public key to decrypt the signature back into the original digest, recomputes a new digest from the transmitted file and compares the two to see if they match. If they do, the file has not been altered in transit by an attacker. See MD5.


An Encrypted Digest
A digital signature is an encrypted digest of a file. The digest was created with a one-way hash function from the file's contents.







Signed Certificates
The first major application for digital signatures is digital certificates. "Signed" digital certificates are used to verify the identity of an organization or individual. They are widely used to authenticate a website in order to establish an encrypted connection for credit card and other confidential data (see SSL and digital certificate).

Signed Files
The second major application for digital signatures is "code signing," which verifies the integrity of executable files downloaded from a website. Code signing also uses signed digital certificates to verify the identity of the site (see code signing and digital certificate). Also see digital envelope and electronic signature.

The Illustrations Below


The following two illustrations show how digital signatures are used for data integrity in both non-private and private exchanges. Because of the requirement of disseminating keys, the following methods are used mostly between two parties that communicate with each other on a regular basis and not by the public in general. The references to the man and woman are used to help explain the concept; however, all functions are automatically performed by the software.


Integrity, But No Privacy
The woman makes her message tamper proof by encrypting the digest into a "digital signature," which accompanies the message. At the receiving side, the man uses her public key to verify the signature. However, the message text is sent "in the clear" and could be read by an eavesdropper.








Message Integrity and Privacy
In this example, the woman signs her message and also encrypts the signature and message with the man's public key for privacy (confidentiality). When he receives the encrypted signed message, he decrypts it with his private key to expose the text he can now read along with the signature. He then verifies the signature to ensure the message was not tampered with.
References in periodicals archive ?
I don't want to talk too much about this but all the clubs around the world know they (Heinze's representatives) have a signed document, so they know the situation, and I don't see what the problem is," said the Liverpool manager.
Many do not realize that when they send an e-mail it is considered a signed document.
Administrators will be able to easily send documents needing an electronic signature directly from their virtual data room on any browser or mobile device and receive the signed documents back into their data room.
Prime Minister Habib Essid described work of the joint committee as "positive," saying the signed documents, which cover most of the areas of bilateral co-operation, will help "hoist bilateral relations to higher levels.
Electronically signed documents are then securely managed and stored in a repository, known as an electronic vault.
Always have an independent legal representative look over all documents before you sign them, keep copies of all signed documents and make sure you have read every document relating to your loan or transaction.
Lyon said he had signed documents when and where he was told to do so, without reading them.
A central government official on Tuesday signed documents to continue the forcible lease of sites in Okinawa Prefecture to the U.
Contract notice: Procurement of a tr-esor middleware for evidence value of cryptographically signed documents according to bsi tr-esor (tr 03125) and their care.
The SEC is alleging that a nonexecutive employee at Pepsi-Cola and another at Frito-Lay signed documents in early 2001 prepared by what is now called Kmart Holding Corp.
The five Americans declined to talk to reporters as they left the immigration office in Puerto Vallarta, where they signed documents pledging not to leave the country.
The SAFE standard provides a secure, legally enforceable, and regulatory compliant way to provide identity verification, non repudiation, and content integrity for electronically signed documents.