Glossary

What Is Digital Signature?

A digital signature is a specific type of electronic signature that uses public key infrastructure (PKI) cryptography to verify the signer's identity and ensure the signed document has not been altered after signing.

Digital Signature Explained

Digital signatures rely on a mathematical scheme involving a pair of cryptographic keys: a private key (known only to the signer) and a public key (available to anyone who needs to verify the signature). When a person signs a document digitally, the software creates a unique hash of the document content and encrypts it with the signer's private key. The recipient can then use the signer's public key to decrypt the hash and verify both the identity of the signer and the integrity of the document.

While all digital signatures are electronic signatures, not all electronic signatures are digital signatures. A simple typed name or drawn signature is an electronic signature but not a digital signature. Digital signatures provide a higher level of security and non-repudiation, making them particularly valuable for regulated industries, government documents, and high-value contracts.

Under the eIDAS regulation in the EU, digital signatures using qualified certificates from trusted service providers achieve the highest legal standing as Qualified Electronic Signatures (QES). In the United States, both standard electronic signatures and digital signatures are legally valid under the ESIGN Act, though certain industries may require the added security of digital signatures.

Key Points

  • 1Uses PKI (public key infrastructure) with a private and public key pair to create and verify signatures.
  • 2Provides tamper evidence: any change to the document after signing invalidates the signature.
  • 3Offers non-repudiation, meaning the signer cannot credibly deny having signed the document.
  • 4Required or preferred for certain regulated industries such as government, healthcare, and finance.
  • 5Recognized as the highest tier (Qualified Electronic Signature) under EU eIDAS regulation.

Examples

Government Contract Filing

A defense contractor digitally signs a proposal using a certificate-based digital signature issued by an approved certificate authority, meeting federal procurement requirements.

Software Code Signing

A software developer digitally signs their application code so that users can verify the software has not been tampered with and truly comes from the stated publisher.

Try eSignTap Free

Legally binding e-signatures starting at $4.99/mo. No credit card required to get started.

Get Started Free
256-bit AES EncryptionESIGN Act & eIDAS CompliantFull Audit Trail4.8/5 Rating

FAQ

What is the difference between a digital signature and an electronic signature?+
An electronic signature is any method of indicating agreement electronically (typed name, drawn signature, click-to-sign). A digital signature is a specific type of electronic signature that uses cryptographic PKI technology to verify the signer's identity and detect any document tampering.
Do I need a digital signature for business documents?+
For most business documents like contracts, NDAs, and invoices, a standard electronic signature is legally sufficient and much simpler to use. Digital signatures are typically required only for specific government, financial, or regulatory use cases.
How do I get a digital signature certificate?+
Digital signature certificates are issued by Certificate Authorities (CAs) such as DigiCert, GlobalSign, or government-approved providers. The process involves identity verification and may take a few days depending on the level of assurance required.
Are digital signatures more legally binding than electronic signatures?+
In most jurisdictions, both are equally legally binding for standard business transactions. However, digital signatures offer stronger evidence of identity and document integrity, which can be advantageous in disputes or highly regulated contexts.
Can digital signatures be forged?+
Modern digital signatures using strong cryptographic algorithms are extremely difficult to forge. The private key would need to be compromised for forgery to occur, which is why protecting private keys is essential.

Related Terms

Related Resources