|What does it do?
||Verifies and defines a document's identity/source. Examples: contract PDFs, work proposals, bids or tenders, quotes, tax filings, etc.
||Establishes credentials, legitimacy, and even the possession of an online medium, such as a website or an email, in some cases..
|How is it obtained?
||Individuals may obtain a Digital Signature by applying for it along with their personal identity documents from any online protection agency or issuing authority. The digital signature is typically given for particular purposes and in the name of the person. There are several digital signature groups, each of which denotes a particular reason for which it can be used..
||Issued by a certificate authority which issues the certificate after performing a background check of the applicant (in the form a server file)..
|What level of security does it provide?
||Authenticity of the sender, document credibility and non-repudiation.
||This provides confidentiality and authenticity for the holder of the certificate.
|Techniques used for encryption
||Using a Digital Signature Format, a digital signature is made (DSS). For encrypting and decrypting the message, it utilises a SHA-1 or SHA-2 algorithm.
||On the principles of public key cryptography standards (PKCS), a digital certificate works . This produces certificates in the format X.509.