Technology

The technology behind digital signatures

Understand the cryptographic foundations, standards, and trust frameworks that make digital signatures legally binding and tamper-proof.

SHA-256 Hash
Cryptography
Verified
X.509 Certificate
PKI Infrastructure
Trusted
PAdES Signature
ETSI Standard
Compliant
3Signature levels

The three pillars of digital signing

Every legally valid digital signature rests on three fundamental pillars: Integrity, Identity, and Intent. Together, they ensure that a signed document is authentic, attributable, and binding.

Integrity

of the document

Integrity guarantees that the document has not been altered after signing. ValidSign uses cryptographic hash functions (SHA-256) to create a unique digital fingerprint of the document. Any modification, even a single character, invalidates the signature. The hash is embedded in the signature container, making tampering mathematically detectable.

Identity

of the signer

Identity ensures that the signer is who they claim to be. ValidSign supports multiple levels of identity verification, from email and SMS authentication to government-issued digital identities like DigiD, eHerkenning, and BankID. For qualified signatures, identity is verified through accredited Trust Service Providers using face-to-face or video identification.

Intent

to sign

Intent proves that the signer deliberately agreed to the content of the document. ValidSign captures explicit consent through interactive signing ceremonies. The signer must actively click to sign, acknowledge the document, and confirm their action. Every step is logged in a tamper-proof audit trail with timestamps, IP addresses, and authentication evidence.

How digital signatures work

A step-by-step look at the cryptographic process that ensures authenticity, integrity, and non-repudiation for every signed document.

Document
SHA-256 Hash
Private Key
Signature
Certificate
Verification
01

Document Preparation

The document is uploaded and a SHA-256 hash is calculated, a unique 256-bit fingerprint that represents the exact content of the document.

02

Key Generation

A public/private key pair is created using RSA-2048 or ECDSA P-256. The private key remains exclusively under the signer's control; the public key is embedded in a digital certificate.

03

Signing

The document hash is encrypted with the signer's private key, creating the digital signature. Only the corresponding public key can decrypt and verify this signature.

04

Certificate Binding

The signature is bound to a digital certificate (X.509) that links the public key to the signer's verified identity, issued by a Certificate Authority in a trusted chain.

05

Packaging

The signature, certificate, and an RFC 3161 timestamp are embedded in the document using PAdES (PDF Advanced Electronic Signatures) format, creating a self-contained signed document.

06

Verification

Anyone can verify the signature using the signer's public key from the certificate. The verifier checks the hash, certificate validity, timestamp, and trust chain, all in one operation.

Standards & signature formats

ValidSign supports all major signature formats defined by ETSI, ensuring interoperability and long-term validity across systems and borders.

PAdESETSI EN 319 142

PDF Advanced Electronic Signatures

PAdES is the standard for embedding electronic signatures in PDF documents, defined by ETSI (European Telecommunications Standards Institute). ValidSign uses PAdES-BES (Basic Electronic Signature) for standard signatures and PAdES-LTV (Long-Term Validation) for signatures that remain verifiable decades after creation.

Primary Use Cases: PDF documents, contracts, invoices, HR forms
PAdES-BESPAdES-EPESPAdES-LTVPAdES-B-BPAdES-B-TPAdES-B-LTPAdES-B-LTA
XAdESETSI EN 319 132

XML Advanced Electronic Signatures

XAdES is designed for XML-based documents and workflows. It supports detached, enveloping, and enveloped signature types, making it ideal for structured data exchanges between enterprise systems.

Primary Use Cases: XML workflows, e-invoicing, government filings, UBL documents
CAdESETSI EN 319 122

CMS Advanced Electronic Signatures

CAdES extends Cryptographic Message Syntax (CMS) for advanced signatures. It supports detached signatures that exist separately from the signed data, making it suitable for binary files and large datasets.

Primary Use Cases: Binary data, detached signatures, email (S/MIME), large files
ASiCETSI EN 319 162

Associated Signature Containers

ASiC is a container format (based on ZIP) that bundles one or more documents with their associated signatures and timestamps. It provides a portable, self-contained package for signed content.

Primary Use Cases: Document bundles, archival, multi-document packages
FormatETSI StandardPrimary Use CasesDescription
PAdES
PDF Advanced Electronic Signatures
ETSI EN 319 142PDF documents, contracts, invoices, HR formsPAdES is the standard for embedding electronic signatures in PDF documents, defined by ETSI (European Telecommunications Standards Institute). ValidSign uses PAdES-BES (Basic Electronic Signature) for standard signatures and PAdES-LTV (Long-Term Validation) for signatures that remain verifiable decades after creation.
XAdES
XML Advanced Electronic Signatures
ETSI EN 319 132XML workflows, e-invoicing, government filings, UBL documentsXAdES is designed for XML-based documents and workflows. It supports detached, enveloping, and enveloped signature types, making it ideal for structured data exchanges between enterprise systems.
CAdES
CMS Advanced Electronic Signatures
ETSI EN 319 122Binary data, detached signatures, email (S/MIME), large filesCAdES extends Cryptographic Message Syntax (CMS) for advanced signatures. It supports detached signatures that exist separately from the signed data, making it suitable for binary files and large datasets.
ASiC
Associated Signature Containers
ETSI EN 319 162Document bundles, archival, multi-document packagesASiC is a container format (based on ZIP) that bundles one or more documents with their associated signatures and timestamps. It provides a portable, self-contained package for signed content.

ETSI standards framework

The European Telecommunications Standards Institute (ETSI) defines the technical standards that govern electronic signatures across Europe. These standards ensure interoperability, security, and legal compliance.

StandardScope
ETSI EN 319 102Procedures for Creation and Validation of AdES Digital Signatures
ETSI EN 319 122CAdES Digital Signatures
ETSI EN 319 132XAdES Digital Signatures
ETSI EN 319 142PAdES Digital Signatures
ETSI EN 319 162Associated Signature Containers (ASiC)
ETSI EN 319 401General Policy Requirements for Trust Service Providers
ETSI EN 319 411Policy and Security Requirements for Trust Service Providers Issuing Certificates
ETSI EN 319 421Policy and Security Requirements for Trust Service Providers Issuing Time-Stamps

eIDAS regulation & trust services

The eIDAS Regulation (EU No 910/2014) establishes a comprehensive legal framework for electronic identification and trust services across the European Union.

What eIDAS means for digital signatures

The eIDAS Regulation creates a single legal framework for electronic signatures, seals, timestamps, and other trust services across all 27 EU member states. It ensures that an electronic signature created in one member state is legally recognized in all others, eliminating barriers to cross-border digital transactions.

Trust Service Providers (TSPs)

TSPs are organizations authorized to create and manage digital certificates, timestamps, and other trust services. Qualified TSPs are supervised by national authorities and undergo regular conformity assessments. ValidSign partners with accredited EU-based Qualified Trust Service Providers.

Qualified Trust Lists (QTL)

Each EU member state publishes a Qualified Trust List that identifies its approved Qualified Trust Service Providers. These lists are the authoritative source for verifying the qualification status of TSPs and their services, ensuring transparency and accountability.

Mutual recognition across the EU

A qualified electronic signature created in any EU member state has the legal equivalent of a handwritten signature in all 27 member states. This mutual recognition is fundamental to the functioning of the EU digital single market.

Three signature levels under eIDAS

SES

Simple Electronic Signature (SES)

Any electronic data attached to or logically associated with other data used to sign. Admissible as evidence but carries the lowest presumption of authenticity.

AES

Advanced Electronic Signature (AES)

Uniquely linked to the signatory, capable of identifying them, under sole control, and linked to data so changes are detectable. Meets Article 26 requirements.

QES

Qualified Electronic Signature (QES)

An AES created by a QSCD and based on a qualified certificate from a Qualified TSP. Has the legal equivalent of a handwritten signature in all EU member states.

Cryptographic foundations

The security of digital signatures rests on well-established cryptographic primitives. Here are the key technologies that make it all work.

SHA-256

Hash functions (SHA-256)

A one-way mathematical function that converts any input, regardless of size, into a fixed 256-bit output. Even the smallest change in input produces a completely different hash. It is computationally infeasible to reverse the hash or find two different inputs that produce the same output (collision resistance).

X.509

Public Key Infrastructure (PKI)

The system of digital certificates, Certificate Authorities (CAs), and registration authorities that verify and authenticate the identity of parties in a digital transaction. PKI creates a hierarchical trust model: Root CA issues to Intermediate CAs, which issue end-entity certificates to individuals and organizations.

RSA / ECDSA

Asymmetric encryption (RSA, ECDSA)

Public/private key pairs where the private key signs data and the public key verifies the signature. ValidSign supports RSA-2048 (widely deployed, proven security) and ECDSA P-256 (equivalent security with shorter keys, better performance). The private key never leaves the secure signing environment.

RFC 3161

Timestamping (RFC 3161)

A cryptographic proof from a trusted Time Stamping Authority (TSA) that a signature existed at a specific point in time. This is critical for long-term validation. Even if a certificate expires or is revoked after signing, the timestamp proves the signature was valid at the time of creation.

CA Chain

Certificate chains

A hierarchy of trust: Root CA (self-signed, embedded in operating systems and browsers) issues Intermediate CA certificates, which issue end-entity certificates to signers. Each certificate in the chain is signed by its parent, creating a verifiable path from the end-entity back to the trusted root.

Root CA → Intermediate CA → End-entity Certificate

ValidSign's implementation

How ValidSign turns these standards and technologies into a production-grade digital signing platform trusted by thousands of organizations.

FIPS 140-2 L3

EU-hosted PKI infrastructure

All cryptographic operations are performed within EU data centers. Private keys are generated and stored in FIPS 140-2 Level 3 certified Hardware Security Modules (HSMs), ensuring keys never exist in plain text outside the secure boundary.

PKIoverheid

PKIoverheid integration

ValidSign integrates with PKIoverheid, the Dutch government's PKI framework, through both KPN and Cleverbase. This enables qualified signatures that are recognized by Dutch government organizations. Cleverbase offers cloud-based qualified certificates, no physical token needed, ideal for remote and hybrid work environments.

RFC 3161

Qualified timestamping

Every signature includes an RFC 3161 timestamp from an accredited Time Stamping Authority (TSA). These qualified timestamps provide irrefutable proof of when a document was signed, independent of the signer's certificate validity period.

PAdES-B-LTA

Long-Term Validation (LTV)

ValidSign embeds all validation data (certificates, CRLs, OCSP responses, and timestamps) directly in the signed document (PAdES-B-LTA). This means signatures can be verified decades after creation, even if the original Certificate Authority no longer exists.

CEN EN 419 241-2

SCAL2 for remote qualified signatures

ValidSign implements Sole Control Assurance Level 2 (SCAL2) as defined in CEN EN 419 241-2. This ensures that only the authorized signer can activate their private key for remote qualified signatures, providing the same security guarantees as a physical smart card.

Interactive Demo

See ValidSign in action

Experience the complete signing workflow, from document upload to legally binding signature.

10-04-2026Signed ✓67% completeSend reminder

Ready to start signing digitally?

See ValidSign in action with a free, personalized demo.