{"id":1104,"date":"2020-06-22T10:00:00","date_gmt":"2020-06-22T10:00:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1104"},"modified":"2020-06-23T13:56:23","modified_gmt":"2020-06-23T13:56:23","slug":"what-is-a-digital-signature-and-how-does-the-digital-signature-process-work","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/","title":{"rendered":"What Is a Digital Signature and How Does the Digital Signature Process Work?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is a digital signature? It\u2019s probably not what you think it is\u2026 in fact, you\u2019re using several right now\u2026<\/h2>\n\n\n\n<p>Although it\u2019s easy to confuse the two, a digital signature isn\u2019t the same thing as an electronic signature. Although both terms include the word \u201csignature,\u201d and they both relate to identity, they\u2019re actually two different processes. A digital signature is a type of electronic signature in the broad sense, but it serves a different function and end goal.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/sectigostore.com\/page\/digital-certificate-vs-digital-signature\/\">digital signature is also different than a digital certificate<\/a> (although the two work in conjunction). Not sure what we mean? You\u2019ll see shortly. In this article, we\u2019ll break down what a digital signature is and how it works. We\u2019ll also dive into the nitty-gritty things to know about the digital signature process as a whole.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is a Digital Signature in Cryptography?<\/h2>\n\n\n\n<p>In a nutshell, a digital signature (also known as an advanced electronic signature or qualified electronic signature, in some cases) is an integral component of <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-pki-a-crash-course-on-public-key-infrastructure-pki\/\" target=\"_blank\" rel=\"noreferrer noopener\">public key infrastructure<\/a> (PKI) that allows users to look at something (an email, document, software application, etc.) and know who it came from. Basically, it\u2019s a way for you to authenticate yourself to another party and show that your item in question is legitimate and unaltered. For example, here\u2019s how a digital signature looks in a signed email:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example-1024x561.png\" alt=\"A combined graphic that shows how email digital signatures look in Outlook\" class=\"wp-image-1106 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example-1024x561.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example-300x164.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example-560x307.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example-940x515.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-email-group-example.png 1109w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Examples of how email digital signature information looks in Outlook.<\/figcaption><\/figure><\/div>\n\n\n\n<p>Another example of a digital signature can be found in SSL\/TLS certificates in the form of the certification path. For example, the SSL\/TLS certificate on SectigoStore.com is signed by the intermediate certificate using a digital signature, which is signed by the root certificate, so you can know for sure that this website was verified by Sectigo:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"738\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/certificate-path.png\" alt=\"A screenshot of the SSL\/TLS certification path\" class=\"wp-image-1107 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/certificate-path.png 602w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/certificate-path-245x300.png 245w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/certificate-path-560x687.png 560w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/figure><\/div>\n\n\n\n<p>Digital signatures work hand-in-hand with <a href=\"https:\/\/csrc.nist.gov\/projects\/hash-functions\" target=\"_blank\" rel=\"noreferrer noopener\">hash functions<\/a>, or what are known more simply as hashes. Ever heard of SHA-2 and <a href=\"https:\/\/medium.com\/bugbountywriteup\/breaking-down-sha-256-algorithm-2ce61d86f7a3\" target=\"_blank\" rel=\"noreferrer noopener\">SHA-256<\/a>? Yeah, those are two of the most common examples of hashing algorithms. (Don\u2019t worry, we\u2019ll talk more about hashing a little later to provide additional clarity.)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Digital Signatures Offer Assurance and Authenticity<\/h3>\n\n\n\n<p>\u2026 Hmm, that didn\u2019t really help much, did it? Okay, let\u2019s try this another way. There are three primary uses for digital signatures:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Authentication<\/strong> \u2014 You\u2019re using a trusted third party such as a certificate authority (CA) to validate that you are the person you claim to be.<\/li><li><strong>Non-repudiation<\/strong> \u2014 What this means is that no one can deny (repudiate) that it was, in fact, you who sent a message or published a piece of software.<\/li><li><strong>Message integrity<\/strong> \u2014 This shows the recipient, email client, OS or server that the data hasn\u2019t been tampered with in any way since it was signed. (<strong>Note:<\/strong> A digital signature doesn\u2019t actually stop someone from tampering with signed data \u2014 it just indicates whether someone has or not so you can make a decision about whether to trust its integrity.)<\/li><\/ul>\n\n\n\n<p>Okay, it probably sounds like something you\u2019d never end up using in daily activities, right? Wrong \u2014 and here\u2019s why.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How a Digital Signature Can Be Used in Real World Applications<\/h2>\n\n\n\n<p>Wondering what a digital signature is in terms of how your organization can use it in the real world? You may be surprised to know that many companies and organizations are already using digital signatures. In fact, if you\u2019ve ever downloaded an app on your computer that displayed a pop-up with the name of the developer or manufacturer who created it, that means that you\u2019ve seen the results of a digital signature application.<\/p>\n\n\n\n<p>You can use digital signatures in a variety of applications:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Email sender authentication<\/li><li>Document and certificate authentication<\/li><li>Software authentication&nbsp;<\/li><\/ul>\n\n\n\n<p>Some of the most common types of <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-pki-certificate\/\">PKI digital certificates<\/a> that use digital signatures include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/sectigostore.com\/secure-email-document-signing\">Email signing certificates<\/a> (AKA personal authentication certificates, S\/MIME certificates, client certificates, etc.)<\/li><li><a href=\"https:\/\/sectigostore.com\/code-signing\">Code signing certificates<\/a><\/li><li><a href=\"https:\/\/sectigostore.com\/ssl-certificates\">SSL\/TLS certificates<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the Digital Signature Process?<\/h2>\n\n\n\n<p>Now that we have a better understanding of what a digital signature is and what it does from a high-level perspective, it\u2019s time to roll up our sleeves and really dig in to how it works on a more technical level.<\/p>\n\n\n\n<p>The digital signature process is based on asymmetric cryptography because it involves the use of a set of mathematically related public and private keys.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"419\" src=\"\">Hashing (and Hash Values)<\/h3>\n\n\n\n<p>In a nutshell, hashing is a simple way of generating a code that uniquely identifies a file. If the file changes, the hash value changes, too. This means that a <a href=\"https:\/\/www.thesslstore.com\/blog\/difference-encryption-hashing-salting\/\" target=\"_blank\" rel=\"noreferrer noopener\">hash<\/a>, for all intents and purposes, is a one-way function that can be applied to a piece of data of any length to produce a unique string of text (what\u2019s known as a hash value, digest, or fingerprint) of a fixed length.<\/p>\n\n\n\n<p>This hash digest is encrypted using the message creator\u2019s private key (and the creator\u2019s public key decrypts it on the end user\u2019s side). The purpose of a hash is to serve as a checksum that proves that the message, code, or whatever it has that\u2019s been hashed hasn\u2019t been altered. (This differs from encryption because encryption is intended to be a two-way process.)<\/p>\n\n\n\n<p>Basically, it takes your message and applies a hash function (such as SHA-256) to it that converts it into a hash value like this:<\/p>\n\n\n\n<p><strong>HELLO =&nbsp; ch857er1iu23rbhfiu23rhb2c2b4l8m4n<\/strong><\/p>\n\n\n\n<p>(Okay, technically, it\u2019s theoretically possible for someone to reverse a hash using brute force. But the amount of time and computational resources that would be required really makes trying to do so pretty pointless\u2026)<\/p>\n\n\n\n<p>It\u2019s important to note that every hash value is unique. If there are two different files that somehow manage to product the same hash value, this results in something called collision. Much like a vehicle collision, a hash collision is also bad. Basically, it means that the hash algorithm is useless and won\u2019t protect your file or message.<\/p>\n\n\n\n<p>Anyhow, to help you better understand what a hash is, let\u2019s think of it in terms of digitally signing an email. You can use an <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">email signing certificate<\/a> to digitally sign your email. This helps you prove to your recipient that it was you who sent the message and that it hasn\u2019t been tampered with since you pushed \u201csend.\u201d (This gives you the authentication and message integrity assurance that we referred to earlier.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Look at the Digital Signature Process (for Email) in Action<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-signing.png\" alt=\"\" class=\"wp-image-1108\" width=\"365\" height=\"498\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-signing.png 501w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-signing-220x300.png 220w\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" \/><figcaption>A breakdown of how the digital signing process works.<\/figcaption><\/figure><\/div>\n\n\n\n<p>Okay, so let\u2019s take a look at how the digital signature process actually works in terms of sending an email:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Purchase an email signing certificate.<\/strong> You can get one from a reputable digital certificate provider (you know, like Sectigo). You have to go through the validation process and all that, but once you have the digital certificate, you\u2019re able to move on to step two.<\/li><li><strong>Install your email signing certificate in your email client<\/strong>. We won\u2019t tell you how to do that here because the process differs from one email client to the next. (Here\u2019s the directions for how you can <a href=\"https:\/\/sectigostore.com\/page\/outlook-encryption-certificate\/\">install and use one of these certificates in Outlook<\/a>.) But don\u2019t worry, it\u2019s a one-time process to install it anyhow. When properly configured, your digital signature can be set to auto-apply to all of your outgoing messages after that.&nbsp;<\/li><\/ol>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-verification.png\" alt=\"\" class=\"wp-image-1111\" width=\"334\" height=\"449\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-verification.png 546w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature-process-verification-223x300.png 223w\" sizes=\"auto, (max-width: 334px) 100vw, 334px\" \/><figcaption>Here&#8217;s an example of the verification process when an item has been digitally signed. When the hash values match, it means that the data is unaltered.<\/figcaption><\/figure><\/div>\n\n\n\n<ol start=\"3\"><li><strong>You create a message that you intend to send.<\/strong> This includes writing any text and attaching any other media.<\/li><li><strong>You (automatically) apply the hash algorithm to your message<\/strong>. Hashing the message (and any attachments) adds greater security. Because it\u2019s automatic, you don\u2019t need to actually do anything when digital signing is enabled. (Your email client does it for you.)<\/li><li><strong>Using your email signing certificate, you apply your digital signature to the message. <\/strong>This maps your email message to a fixed length output. It uses your public key to digitally sign it. Again, this happens automatically \u2014 your email client does the work.<\/li><li><strong>The hashed message and hashed signature are then encrypted.<\/strong> This is the icing on the cake if you have email encryption enabled. This process is what allows you to send the data across potentially insecure transmission channels. So, when your message leaves your email client and travels from one email server to another, even if someone intercepts the message, they can\u2019t read it. (Encrypting data at rest requires the recipient to also have an email signing certificate as well, though, and you\u2019d have to have the recipient\u2019s public key, but that\u2019s a process for another article).<\/li><li><strong>You transmit the digitally signed and encrypted message.<\/strong> This leaves your email client and transmits across the internet, going from your email server to theirs (and then on to their email client).<\/li><li><strong>Your recipient validates the digital signature using the same algorithm and your public key.<\/strong> Part of this process is recreating your hashed digest.<\/li><li><strong>Your recipient\u2019s email client inspects the two unique hash values.<\/strong> The hash value that\u2019s created is compared with the one attached in your message to ensure that they match. If they match, it means that the email is unaltered \u2014all is hunky-dory and your recipient can go about their business. If they don\u2019t, they\u2019ll receive a warning message that indicates something\u2019s wrong with your email, which casts you (and your organization) in a very bad light. Not so hunky-dory.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Last Word on Digital Signatures<\/h2>\n\n\n\n<p>As you\u2019ve learned, digital signatures are a great way to assert identity and to authenticate data and the people responsible for creating or sending it. They also work hand-in-hand to validate the integrity of the data in question by indicating whether it\u2019s been tampered with (although it can\u2019t stop the tampering event from happening in the first place).<\/p>\n\n\n\n<p>Digital signatures in cryptography have a lot of different uses \u2014 they\u2019re an essential part of information security for websites, documents, emails, and more. Fun fact: You use digital signatures every day, even if you\u2019re not aware of them. Your browser uses multiple digital signatures to verify our website when you clicked to read on this article. &nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a digital signature? It\u2019s probably not what you think it is\u2026 in fact, you\u2019re using several right now\u2026 Although it\u2019s easy to confuse the two, a digital signature&#8230;<\/p>\n","protected":false},"author":8,"featured_media":1119,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,47],"tags":[84],"class_list":["post-1104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-email-security","tag-digital-signatures","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Learn what a digital signature is &amp; how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process &amp; how it authenticates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Learn what a digital signature is &amp; how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process &amp; how it authenticates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-23T13:56:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"What Is a Digital Signature and How Does the Digital Signature Process Work?\",\"datePublished\":\"2020-06-22T10:00:00+00:00\",\"dateModified\":\"2020-06-23T13:56:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/\"},\"wordCount\":1753,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/digital-signature.jpg\",\"keywords\":[\"digital signatures\"],\"articleSection\":[\"Cyber Security\",\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/\",\"name\":\"What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/digital-signature.jpg\",\"datePublished\":\"2020-06-22T10:00:00+00:00\",\"dateModified\":\"2020-06-23T13:56:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Learn what a digital signature is & how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process & how it authenticates.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/digital-signature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/digital-signature.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Image of two hands on blue and green background. Closed lock icon in the center, as a symbol of confidentiality, data protection and security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a Digital Signature and How Does the Digital Signature Process Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights","description":"Learn what a digital signature is & how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process & how it authenticates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/","og_locale":"en_US","og_type":"article","og_title":"What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights","og_description":"Learn what a digital signature is & how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process & how it authenticates.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/","og_site_name":"InfoSec Insights","article_published_time":"2020-06-22T10:00:00+00:00","article_modified_time":"2020-06-23T13:56:23+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"What Is a Digital Signature and How Does the Digital Signature Process Work?","datePublished":"2020-06-22T10:00:00+00:00","dateModified":"2020-06-23T13:56:23+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/"},"wordCount":1753,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg","keywords":["digital signatures"],"articleSection":["Cyber Security","Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/","url":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/","name":"What Is a Digital Signature and How Does the Digital Signature Process Work? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg","datePublished":"2020-06-22T10:00:00+00:00","dateModified":"2020-06-23T13:56:23+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Learn what a digital signature is & how it works. We\u2019ll also dive into the nitty-gritty details of the digital signature process & how it authenticates.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/digital-signature.jpg","width":1600,"height":1000,"caption":"Image of two hands on blue and green background. Closed lock icon in the center, as a symbol of confidentiality, data protection and security."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is a Digital Signature and How Does the Digital Signature Process Work?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1104"}],"version-history":[{"count":9,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1104\/revisions"}],"predecessor-version":[{"id":1137,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1104\/revisions\/1137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1119"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}