The concept of a digital signature was established to recognize unauthorized changes to mask fields. A pair of keys is used for this purpose: a private and a public key (asymmetrical encoding process). This function is usually available in the article, document and project administration (the field contents are summarized in a "document"). |
|
![]() |
For a fee you can receive the pair of keys (the so-called "private exchange file") from a certification bureau, which ensures that the generated keys are unique. They also determine and certify the identity of the key owner. |
|
Principle of the Digital SignatureSignature Setup |
The following steps are necessary to create a digital signature:
|
|
Checking the Signature |
|
Checking the signature is similar to the creation process:
There are now two "fingerprints" that are identical as long as the document has not been changed. If a deviation is present that means that a document was changed or that another user signed the document (in the second case the private and the public keys do not correspond). |
|
Further information, guidelines, and laws for digital signatures can be found at the Electronic Privacy Information Center. |