Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Digital signatures

&pagelevel(4)&pagelevel

In addition to ensuring data integrity, cryptographic hash algorithms are used to create digital signatures. For this purpose a hash value (message digest) is first calculated from a plain text, and this is then encrypted with a private key. Digital signatures are suited particularly for securing non-repudiation.

For security reasons, the minimum length of the public key used should be 2048 bits.