Bdfb3f72a37ab78fb0bd9d18015a795e

Customer Service For EveryoneCreated on 2019-03-07 by jennysang

Applying the Signature

  1. When you click "sign", a unique digital fingerprint (called a hash) of the document is created using a mathematical algorithm. This hash is specific to this particular document; even the slightest change would result in a different hash.

  2. The hash is encrypted using the signer's private key. The encrypted hash and the signer's public key are combined into a digital signature, which is appended to the document.

  3. The digitally signed document is ready for distribution.

Verifying the Signature

  1. When you open the document in a digital signature-capable program (e.g., Adobe Reader, Microsoft Office), the program automatically uses the signer's public key (which was included in the digital signature with the document) to decrypt the document hash.

  2. The program calculates a new hash for the document. If this new hash matches the decrypted hash from Step 1, the program knows the document has not been altered and displays messaging alone the lines of, "The document has not been modified since this signature was applied."

The program also validates that the public key used in the signature belongs to the signer and displays the signer's name.

Hope it will help

You can apply for the Digital Signature Certificate by clicking on the link. Applying the Signature

  1. When you click "sign", a unique digital fingerprint (called a hash) of the document is created using a mathematical algorithm. This hash is specific to this particular document; even the slightest change would result in a different hash.

  2. The hash is encrypted using the signer's private key. The encrypted hash and the signer's public key are combined into a digital signature, which is appended to the document.

  3. The digitally signed document is ready for distribution.

Verifying the Signature

  1. When you open the document in a digital signature-capable program (e.g., Adobe Reader, Microsoft Office), the program automatically uses the signer's public key (which was included in the digital signature with the document) to decrypt the document hash.

  2. The program calculates a new hash for the document. If this new hash matches the decrypted hash from Step 1, the program knows the document has not been altered and displays messaging alone the lines of, "The document has not been modified since this signature was applied."

The program also validates that the public key used in the signature belongs to the signer and displays the signer's name.

Hope it will help http://idltechnologies.com/