kb/data/developer.mozilla.org/en-US/docs/Glossary/Digital_signature-0.md

11 KiB

title chunk source category tags date_saved instance
Digital signature - Glossary | MDN 1/3 https://developer.mozilla.org/en-US/docs/Glossary/Digital_signature reference web, html, css, javascript, documentation 2026-05-05T05:29:45.973581+00:00 kb-cron

MDN HTML HTML: Markup language

HTML reference

HTML guides

Markup languages

CSS CSS: Styling language

CSS reference

CSS guides

Layout cookbook

JavaScriptJS JavaScript: Scripting language

JS reference

JS guides

Web APIs Web APIs: Programming interfaces

Web API reference

Web API guides

All All web technology

Technologies

Topics

Learn Learn web development

Frontend developer course

Learn HTML

Learn CSS

Learn JavaScript

Tools Discover our tools

About Get to know MDN better

Blog

  1. Glossary
  2. Digital signature

Digital signature

A digital signature is an object that can be used to authenticate the author of a document or message. Digital signatures are usually based on public-key cryptography, in which a key is created as a pair of keys, with the property that, if some input is encrypted with one key, it can only be decrypted with the other key, and vice versa. The creator of the key pair makes one of the keys public and keeps the other one private. To sign a document, the key pair's owner creates a hash of the document and encrypts it with the private key. The document and signature are sent to the verifier, who hashes the document, retrieves the public key, and decrypts the signature: if this matches the hash, then the signature has been verified, and the verifier can be confident that it was created by an entity with access to the private key. The security of a digital signature system depends (among other things) on:

  • The private key's owner keeping it safe: if other entities can access the private key, they can impersonate the owner.
  • The public key used by the verifier being the genuine counterpart of the owner's private key: if an attacker could trick the verifier into trusting the wrong public key, they could impersonate the owner.

Verifiers often use digital certificates to check that public keys are genuine.

In this article

See also