Authenticity is meant to validate the source or origin of data and other file transfers. It’s the assurance that a message, transaction, or other exchange of information is from the source it claims to be from. This is important because it ensures that the record has not been forged or corrupted during transmission.
This section provides all the information needed to understand and integrate with BLOOCK’s digital signature tooling.
What’s a digital signature?
A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). Digital signatures create a virtual fingerprint that is unique to a person or entity and are used to identify users and protect the information in digital messages or documents. In emails, the email content itself becomes part of the digital signature. Digital signatures are significantly more secure than other forms of electronic signatures.
What is the process?
In the scenario that you need to send your friend Fred a cat picture through your email. How could he know that the email is not corrupted and that it is the original file?
Step 1 is preparation.
You create a huge random number: the private key. You can use this to create digital signatures. You then create the public key, which is used to verify the signatures the private key creates. The public key is calculated from the private key. You hand the public key to Fred in person so Fred is sure it belongs to you.
Step 2 is signing.
You write an email to Fred and attach the cat picture. You also use your private key and the cat picture to sign the cat picture digitally. The result is a digital signature that you include in your email message. You then send the email to Fred.
Step 3 is verifying.
Fred receives your email, but he’s concerned the cat picture might be corrupt, so he wants to verify the signature. He uses the public key he got from you in step 1, the digital signature in the email, and the attached cat picture. If the signature or the cat picture has changed since you created the signature, the verification will fail.
How is BLOOCK working with digital signature?
BLOOCK currently supports different digital signature methods. You can choose the one it better accomplishes your requirements.
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Ethereum Name Service (ENS)
Elliptic Curve Digital Signature Algorithm or ECDSA is a digital signature algorithm (DSA) that uses elliptic-curve cryptography.
It works by initially generating a key pair (public key + private key) which will be used for signing and further verification. Specifically, the private key is used to generate the signature, and the public key is used for the verification process.
It’s vital that you never disclose your private key. You must keep it safe on your system or you can use managed software such as a Vault or an HSM to keep it secure for you.
Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain.
It’s used as a blockchain-based DNS in a way that you are able to acquire (.eth) domains and assign them to an Ethereum public key (extracted from the secp256k1 elliptic curve).
Applied in an authenticity context, BLOOCK allows you to sign some data/documents using your Ethereum’s private key and extract your (.eth) domain as a result of the verification process.
For more information on our product, feel free to book a meeting with a blockchain expert HERE