Blockchain Tutorial

Blockchain Tutorial History of Blockchain Blockchain Terminologies Working of Blockchain Blockchain vs DLT Blockchain Versions Smart Contracts Blockchain Applications Cryptography Role of Bitcoin Miners Blockchain Hash Function Bitcoin Basic Component Blockchain Block Hashing How to Block Hashes Work in Blockchain Blockchain Pow Coinbase Transaction Key Concepts in Bitcoin Key Areas of Blockchain Blockchain Cryptocurrency Blockchain DAO Blockchain Double Spending Blockchain Bitcoin Cash Bitcoin Forks and SegWit Blockchain Merkle Tree Difference between Blockchain and Database Bitcoin Mitigating Attacks Who sets the Bitcoin Price Getting Started with Bitcoin How to choose Bitcoin Wallet Sending and Receiving Bitcoin Converting Bitcoins to Fiat Currency Ethereum 2.0 Blockchain Data Management Steps to become a Blockchain developer Smart Contracts Advantages of Blockchain in healthcare Decentralized Voting System using Blockchain Demur-rage currencies in Blockchain How can Blockchain Technology help IoT to reach its full potential Project Ideas on Blockchain for Professionals Consensus Algorithms in Blockchain Top 10 Blockchain Project Concepts Uses of Blockchain Obtaining Free Test Ethers What does a Blockchain contain What does the IT industry mean by BaaS Top Blockchain Project Ideas for Beginners

Cryptography

Introduction and Features of Cryptography DNA cryptography ECB Mode in Cryptography Elliptic curve in cryptography Format String Vulnerabilities in Cryptography and Network Security Kerberos in Cryptography and Network Security Blowfish Algorithm in Cryptography Data Encryption Standards Feistel Cipher in Cryptography HMAC Algorithm in Cryptography IP Security in Cryptography ElGamal Algorithm ElGamal Cryptosystem What is IDEA Advantages of Cryptography Role of Bitcoin Miners Blockchain Hash Function Blockchain Merkle Tree Blockchain Pow Coinbase Transactions Consensus Algorithms in Blockchain Converting Bitcoins to Fiat Currency Decentralized Voting System using Blockchain Demur-rage currencies in Blockchain Difference between Blockchain and Database Difference between Symmetric and Asymmetric Encryption Ethereum 2.0 Getting Started With Bitcoin How can Blockchain Technology help IoT to reach its full potential? How does Digital Signature Work Advantages of Blockchain in healthcare Basic Component of Bitcoin Bitcoin Forks and SegWit Bitcoin Mitigating Attacks Blockchain Bitcoin Cash Blockchain Block Hashing Blockchain Cryptocurrency Blockchain DAO Blockchain Data Management Blockchain Double Spending What does Blockchain contain? What does the IT industry mean by BaaS (Blockchain as a Service)? Who sets the Bitcoin Price? Working of Block Hashes in Blockchain How to Choose Bitcoin Wallet? Key Areas of Blockchain Key Concepts in Bitcoin Obtaining Free Test Ethers for the Rinkeby Test Network on the Ethereum Blockchain Project Ideas on Blockchain for Professionals Sending and Receiving Bitcoin Top 10 Blockchain Project Concepts Uses of Blockchain What do you need to do to become a Blockchain Developer? Blockchain Technology-Introduction

How does Digital Signature Work

What are Digital Signatures

Digital Signature is a type of signature used to check the integrity and accuracy of electronic documents. The primary use of digital signatures is to provide integrity, authentication, and nonrepudiation to electronic messages.

Digital signatures are kind of public-key cryptography in which we use two keys; these are a public key and private key. Private keys are only known by their owner, and a public key is known by everyone who wants to communicate with the owner. To verify a digital signature, the receiver checks the sender's private key to decrypt the signature and find the hash. The receiver establishes a hash of the original documents or message using the same algorithm used by the sender. Then it compares this hash to decrypted hash obtained from the signature. After performing this, if the value of two hashes matched then the signature is considered valid, and then the message is examined accurate and unaltered.

An example of a digital signature is that when we use software to sign documents such as PDFs and other files, many software programs, such as Adobe Acrobat, can create a digital signature using public-key cryptography.

Characteristics of Digital Signature

  1. Authentication:  Authentication in digital signature refers to verifying the sender's identity and ensuring that the signature has not been tampered with. And digital signature provides various authentication measures, such as Public-key cryptography, digital signature, multi-factor authentication, and biometrics.
  2. Security: Security is a one of the most important aspects of digital signatures, it used to check the integrity and availability of electronic documents. And some of the security measures of digital signature are
  3. Public-key cryptography
  4. Hashing
  5. Timestamping
  6. Revocation
  7. Certificate Authorities
  8. Non-repudiation: Nonrepudiation is one of the essential digital signature features, ensuring that electronic transactions are legally binding and cannot be denied by the sender. It also ensures the sender cannot deny signing the electronic message or document. And when a digital signature is created, it uses the sender's private key to encrypt a unique "fingerprint" of the document called a hash.
  9. Integrity: Integrity is also essential for digital signature and ensuring that the contents of the document or message have not been tampered with since it was signed.
  10. Efficiency: Digital signature are efficient and very easy to use, which allows users to sign and verify documents and message quickly. 

Working of Digital signature

The below diagram shows a working of digital signature. This Digital Signature uses private and public keys, and no one shares the private key. It also ensures that no one besides the sender can replicate the sender's signature, and everyone shares it as public. It helps to send a secure message to the receiver. And if both keys match, then a secure transaction takes place, and a verification process is used to verify the message's authenticity.

A digital signature is the type of electronic signature that uses a public-key cryptography to ensure the integrity and authenticity of electronic messages. Working of digital signature requires complicated procedure, and these steps provides a secure and good way to sign and verify electronic transactions.

Digital signature requires various steps:

  • Hashing: it is the first step in working of a digital signature, and this step involves running the document through a cryptographic hash function that generates a fixed-length hash value. The hash function takes the input data, applies an algorithm, and produces an accurate, unique, fixed-length output. The hash value it produces a unique and represents its content in a secure form, and it is impossible to regenerate the original document from the hash.   
  • EncryptionEncryption is one of the most critical steps of the digital signature process. This encryption is based on public-key cryptography, which involves using a pair of private and public keys to encrypt and decrypt data. The sender controls the private key, and others share the public key. When the sender encrypts the hash value with their private key and then public key helps to decrypt the digital signature and find the hash value. This encryption process used in signature ensures that the digital signature is unique to the sender.
  • Digital Signature:  Digital signature’s classification is based on the private and public critical systems, and also it hooked with the original document. This can be done by attaching the signature within a document or also by attaching it in a message file.
  • Transmission: In this step, the digital signature will transmit through all the signed documents or messages to the receiver. And the signature can be transmitted separately as part of the signed document.
  • Verification: Verification is most important step in the digital signature, and it is a method to authenticate the sender’s identity, used for checking the validity of the digital signature, and also checking that the document or message has not been tampered with during transmission and this verification process takes place with special software tools, which also used to verify the sender's identity, certificates status and the integrity of the signed document or message.
  • Non-repudiation: Once the digital signature is verified, it ensures the nonrepudiation of the document. It provides applicability to digital signatures and makes them a trusted and more secure method to design and exchange documents.