1b. Digital Signatureback to the table of contentsDigital signatures are an essential component of cryptocurrency systems. In general, the benefits of digital signatures are as follows:
• Authentication: Ensure that a known party creates the digital signature.
• Non-repudiation: ensuring that the creator of the signature cannot deny that they have created the signature.
• Integrity: ensuring that the information to which the signature is affixed has not undergone any unauthorized changes.
These three elements are essential in cryptocurrency, as the user's real identity is not required for financial transactions (except for anything related to the cryptocurrency market, which requires proof of identity).
Digital signatures ensure that only the money's rightful owner can use it. While digital signatures are not the only method of authenticating transactions, they are the primary method highly recommended.
In addition, digital signatures also ensure that the transaction data is unaltered. For example, Alice wants to send 0.5 XBT (one of the symbols of Bitcoin) of cryptocurrency to Bob. With a digital signature, Alice cannot deny that she sent the money to Bob.
Using the same example, it happens that Carol, who controls Alice's Internet network, can capture Alice's transaction information. Tempted by the high price of Bitcoin, Carol tries to modify the transaction data, which should be sent to Bob to Carol (herself). Digital signatures can detect this change, and the system can reject the altered transaction.
Digital signatures are one of the products that use asymmetric cryptography technology. How it works can be seen in the following image:
Figure How a digital signature works. Source: https://en.wikipedia.org/wiki/Electronic_signature#Digital_signature.The two algorithms associated with digital signatures are the signing and verification algorithms. If you look closely, the process in the signing algorithm is a modification of the encryption process, as shown in the Asymmetric Cryptography figure (see section
1a. Asymmetric Cryptography) and a combination with hash techniques. In the signing process, the signer uses his private key to encrypt the hash value of the signed electronic document. This process results in a digital signature that can be attached to the electronic document.
The digital signature verification process is the reverse of the signing process. First, the electronic document and the digital signature are separated. The digital signature is then decrypted using the signer's public key, which was obtained previously. The result of this process is a hash value, which is then compared with the hash value of the electronic document. If both hash values are identical, then it can be said that the digital signature is valid.
Referenceback to the table of contents-
https://en.wikipedia.org/wiki/Digital_signature-
https://en.wikipedia.org/wiki/Electronic_signature#Digital_signature- Dimaz Ankaa Wijaya -
Bitcoin Mining dan Cryptocurrency lainnya ...., Jasakom 2018, page 7-8
- Husna QA -
Tanda Tangan Digital