Electronic information signature technology has the characteristics of undeniable and verifiable information. Both private key and public key algorithms can be used for signature, and public key Top is commonly used now.
Digital signature refers to the data obtained by encrypting the hash abstract of the original data with the user's own private key. The information receiver uses the sender's public key to decrypt the digital signature attached to the original information to obtain a hash digest, and at the same time generates a hash digest from the received original data. By comparing the two, we can determine whether the original information has been tampered with. This ensures the non-repudiation of data transmission.
In order to understand the concept of digital signature, we must first understand the concepts of public key encryption and hash function.