Signature |
Encryption |
A signature is used to verify the authenticity of the message in the email or document |
Encryption is used to encode sensitive information in an email or document. |
The signer uses his private key to sign the document. |
The private key is used by the receiver to decrypt the encrypted data in email or documents. |
The public key is used by the receiver to verify the signature with the sender. |
The sender uses his/her public key to encrypt data in an email or document. |
Signature is considered verified only if the message remains unaltered and untampered in between sending and receiving the signature. |
Only the receiver can use his private key to decrypt the data. If the data is decrypted, it is considered to be verified. |
A digital signature certificate stores the signature of the user after verification of identity. |
A digital signature certificate verifies and authenticates the identity of the sender to generate the encryption keys. |
Users need to have a signature certificate from an authorized certifying authority to legally sign a document. eMudhra provides signature certificates, encryption certificates, or both at reasonable prices. |
Users need to possess an encryption certificate from an authorized certifying authority (Emudhra) to successfully encode a message. |