11 KiB
| title | chunk | source | category | tags | date_saved | instance |
|---|---|---|---|---|---|---|
| Digital signature - Glossary | MDN | 1/3 | https://developer.mozilla.org/en-US/docs/Glossary/Digital_signature | reference | web, html, css, javascript, documentation | 2026-05-05T05:29:45.973581+00:00 | kb-cron |
MDN HTML HTML: Markup language
HTML reference
HTML guides
Markup languages
CSS reference
CSS guides
Layout cookbook
JavaScriptJS JavaScript: Scripting language
JS reference
JS guides
Web APIs Web APIs: Programming interfaces
Web API reference
Web API guides
- Using the Web animation API
- Using the Fetch API
- Working with the History API
- Using the Web speech API
- Using web workers
Technologies
Topics
Learn Learn web development
Frontend developer course
- Getting started modules
- Core modules
- MDN Curriculum
- Check out the video course from Scrimba, our partner
Learn HTML
Learn CSS
Learn JavaScript
Tools Discover our tools
About Get to know MDN better
Digital signature
A digital signature is an object that can be used to authenticate the author of a document or message. Digital signatures are usually based on public-key cryptography, in which a key is created as a pair of keys, with the property that, if some input is encrypted with one key, it can only be decrypted with the other key, and vice versa. The creator of the key pair makes one of the keys public and keeps the other one private. To sign a document, the key pair's owner creates a hash of the document and encrypts it with the private key. The document and signature are sent to the verifier, who hashes the document, retrieves the public key, and decrypts the signature: if this matches the hash, then the signature has been verified, and the verifier can be confident that it was created by an entity with access to the private key. The security of a digital signature system depends (among other things) on:
- The private key's owner keeping it safe: if other entities can access the private key, they can impersonate the owner.
- The public key used by the verifier being the genuine counterpart of the owner's private key: if an attacker could trick the verifier into trusting the wrong public key, they could impersonate the owner.
Verifiers often use digital certificates to check that public keys are genuine.
In this article
See also
- Related glossary terms: