digital-signature

digital-signature

Security pattern for implementing digital signatures. Use when implementing document signing, code signing, certificate signing, non-repudiation, or verifying authenticity and integrity of messages using asymmetric cryptography (RSA, ECDSA, Ed25519).

2stars
1forks
Updated 1/22/2026
SKILL.md
readonlyread-only
name
digital-signature
description

Security pattern for implementing digital signatures. Use when implementing document signing, code signing, certificate signing, non-repudiation, or verifying authenticity and integrity of messages using asymmetric cryptography (RSA, ECDSA, Ed25519).

Digital Signature Security Pattern

Create and verify digital signatures to ensure data integrity, authenticity, and non-repudiation using asymmetric cryptography.

Properties Provided

  1. Data Integrity: Message not modified since signing
  2. Authentication: Message originated from key holder
  3. Non-repudiation: Signer cannot deny having signed

Core Components

Role Type Responsibility
EntityA Entity Creates digital signatures
EntityB Entity Verifies digital signatures
Signature Generator Cryptographic Primitive Creates signatures
Signature Verifier Cryptographic Primitive Verifies signatures

Data Elements

  • message: Data to be signed
  • signature: Digital signature of message
  • private_key: Signing key (secret)
  • public_key: Verification key (can be distributed)

Signature Flow

Signing

EntityA → [sign(message, private_key)] → Signature Generator
Signature Generator → [signature] → EntityA
EntityA → [message + signature] → EntityB

Verification

EntityB → [verify(message, signature, public_key)] → Signature Verifier
Signature Verifier → [valid/invalid] → EntityB

Comparison with MAC

Aspect Digital Signature MAC
Key type Asymmetric (public/private) Symmetric (shared)
Non-repudiation Yes No
Verification key Public (distributable) Secret (shared)
Performance Slower Faster
Use case External parties, legal Internal, performance

Use digital signatures when non-repudiation required or verifiers shouldn't be able to create signatures.

Algorithm Recommendations

RSA Signatures

Variant Status Notes
RSA-PSS Recommended Probabilistic padding
RSA-PKCS#1 v1.5 Acceptable Deterministic, widely supported

Key sizes:

  • 3072 bits: Recommended for long-term
  • 2048 bits: Minimum acceptable
  • 4096 bits: High security requirements
  • 15360 bits: 30+ year protection (if needed)

Elliptic Curve Signatures

Algorithm Curve Status
Ed25519 Curve25519 Recommended (modern)
ECDSA P-256 Recommended
ECDSA P-384 High security
ECDSA P-521 Highest security

Key sizes:

  • 256 bits: Standard security (≈RSA 3072)
  • 384 bits: High security
  • 512 bits: Long-term protection

Hash Functions for Signing

  • SHA-256: Standard
  • SHA-384/SHA-512: Higher security
  • SHA-3: Alternative

Never: MD5, SHA-1

Security Considerations

Private Key Protection

Critical: Private key security = signature trustworthiness

  • Store in HSM for high-value keys
  • Use secure key storage APIs
  • Never expose in logs or errors
  • Implement access controls
  • Consider key ceremonies for critical keys

Public Key Authenticity

Verifier must trust public key belongs to signer:

  • Certificate from trusted CA
  • Out-of-band verification
  • Web of trust
  • Key pinning

Algorithm Selection

  • Use current recommendations
  • Plan for algorithm transitions
  • Avoid deprecated algorithms

Timestamp Considerations

  • Include timestamp in signed data
  • Consider timestamping service
  • Prevents backdating

Message Hashing

Typically, signature is over hash of message:

  1. Hash the message (SHA-256)
  2. Sign the hash

Library usually handles this—verify behavior.

Signature Malleability

Some signature schemes are malleable (valid signature can be modified to create another valid signature). Use signature schemes that prevent malleability or handle at application layer.

Common Use Cases

Code Signing

  • Sign software/updates
  • Verify before installation
  • Protect against tampering

Document Signing

  • Legal documents
  • Contracts
  • Non-repudiation

Certificate Signing

  • X.509 certificates
  • CA hierarchy
  • TLS/HTTPS

JWT Signing

  • Token integrity
  • RS256 (RSA), ES256 (ECDSA)
  • Verify before trusting claims

API Request Signing

  • Request authenticity
  • Webhook verification
  • Prevents tampering

Implementation Checklist

  • [ ] Using RSA-PSS, Ed25519, or ECDSA
  • [ ] Key size ≥ 3072 bits (RSA) or ≥ 256 bits (ECC)
  • [ ] Private key stored securely
  • [ ] Public key authenticity established
  • [ ] SHA-256+ for hashing
  • [ ] No MD5 or SHA-1
  • [ ] Verification before trusting signed data
  • [ ] Algorithm agility for future changes

Common Mistakes

Mistake Impact Fix
Weak key size Forgery possible Use recommended sizes
MD5/SHA-1 Collision attacks Use SHA-256+
Private key exposure Full compromise Secure storage (HSM)
Skipping verification Accept forged data Always verify
Trusting unverified public key Accept attacker's signature Establish key authenticity

Related Patterns

  • Cryptographic action (parent pattern)
  • Message authentication code (symmetric alternative)
  • Cryptographic key management (key handling)
  • Verifiable token-based authentication (JWT use case)

References

You Might Also Like

Related Skills

create-pr

create-pr

170Kdev-devops

Creates GitHub pull requests with properly formatted titles that pass the check-pr-title CI validation. Use when creating PRs, submitting changes for review, or when the user says /pr or asks to create a pull request.

n8n-io avatarn8n-io
Get

Guide for performing Chromium version upgrades in the Electron project. Use when working on the roller/chromium/main branch to fix patch conflicts during `e sync --3`. Covers the patch application workflow, conflict resolution, analyzing upstream Chromium changes, and proper commit formatting for patch fixes.

electron avatarelectron
Get
pr-creator

pr-creator

92Kdev-devops

Use this skill when asked to create a pull request (PR). It ensures all PRs follow the repository's established templates and standards.

google-gemini avatargoogle-gemini
Get
clawdhub

clawdhub

87Kdev-devops

Use the ClawdHub CLI to search, install, update, and publish agent skills from clawdhub.com. Use when you need to fetch new skills on the fly, sync installed skills to latest or a specific version, or publish new/updated skill folders with the npm-installed clawdhub CLI.

moltbot avatarmoltbot
Get
tmux

tmux

87Kdev-devops

Remote-control tmux sessions for interactive CLIs by sending keystrokes and scraping pane output.

moltbot avatarmoltbot
Get
create-pull-request

create-pull-request

57Kdev-devops

Create a GitHub pull request following project conventions. Use when the user asks to create a PR, submit changes for review, or open a pull request. Handles commit analysis, branch management, and PR creation using the gh CLI tool.

cline avatarcline
Get