{"id":68562,"date":"2018-09-07T12:30:12","date_gmt":"2018-09-07T10:30:12","guid":{"rendered":"https:\/\/easy-software.com\/?post_type=glossar&p=68562"},"modified":"2025-06-06T09:31:29","modified_gmt":"2025-06-06T07:31:29","slug":"digital-signature","status":"publish","type":"glossar","link":"https:\/\/easy-software.com\/en\/glossary\/digital-signature\/","title":{"rendered":"Digital signature"},"content":{"rendered":"
\n
\n
\n
\n\n
    \n
  1. For one thing, a digital signature serves to prove the undeniable authorship of the email<\/li>\n\n\n\n
  2. For another, the digital signature serves to prove the integrity of the email.<\/li>\n<\/ol>\n\n\n\n

    In other words, the digital signature<\/a> can be used, on the one hand, to check if and ensure that the email actually comes from the sender shown in the email program. On the other hand, it can be used to check if the contents of the email have been changed during sendin<\/p>\n\n\n\n

    How does the digital signature work \u2013 how are these two goals achieved?<\/h2>\n\n\n\n

    The procedure for creating a digital signature<\/a> is based on the principle of asymmetric cryptography. Asymmetric here means that a key pair is always used to sign and encrypt a message. Everyone involved in the process has a public and a private \u2013 which is always and consistently kept secret <\/strong>\u2013 key. The two keys form the key pair.<\/p>\n\n\n\n

    Sign<\/h2>\n\n\n\n