← Back to Blog

Digital Signature (Asymmetric/shared key Cryptosystem)

Cover image for Digital Signature (Asymmetric/shared key Cryptosystem)
Zeeshan
Zeeshan

February 26, 2026 1 min read

Share:
👁️ 3 views📅 2/26/2026

In a digital signature, the sender applies their private key to a message to generate a signature. The receiver verifies the signature using the sender’s public key, ensuring authenticity and integrity. In practice, the message hash is signed instead of the entire message for efficiency.
🔑 Step-by-Step Explanation

✅ Step 1: Bob signs message

Bob wants to prove he is the sender.

He computes:

S=DSB(M)S = D_{S_B}(M)S=DSB​​(M)

Meaning:
👉 Bob applies his private key to message MMM
👉 Result SSS is the digital signature


✅ Step 2: Bob sends message + signature

Bob sends:

👉 Message MMM
👉 Signature SSS


✅ Step 3: Alice verifies signature

Alice applies Bob’s public key:

M=EPB(S)M = E_{P_B}(S)M=EPB​​(S)

If she gets the original message → signature is valid.


Comments

Sign in to comment.

Loading comments...

Related posts

Main culprit behind NoSQL injection (MongoDB)

Why NoSQL injection happens in MongoDBWhen a backend receives login data (for example, an email and password), it usually queries MongoDB to find a ma...

How "npm audit fix --force" Broke My React App: A Phantom Dependency Horror Story [March 2026]

Meta Description:Learn why npm audit fix --force destroyed my React app by creating phantom dependencies, and how to safely handle npm security warnin...

Public Key Cryptosystem / Asymmetric Cryptosystem

Public key cryptosystem is alternative to symmetric/shared key cryptosystem. In this system user contains two keys : 1. Public key that is available t...

Public Key Cryptosystem / Asymmetric Cryptosystem

Public key cryptosystem is alternative to symmetric/shared key cryptosystem. This system contains two keys :

Symmetric / Shared Key Cryptosystem

For confidential communication between a group of n users requiere n(n-1)/2 number of keys, such that each key is specific to communication between on...

Eavesdropper

A person / hacker who listens between two parties