English | Ελληνικά

Single post

Digital Signature


The use of digital signatures both at European level and in our country has been established and is an alternative to the document throughput in a conventional manner. Digital signatures are a key mechanism for protecting these data, providing certification of the sender's identity and the protection from malicious and unintentional tampering of electronic documents. Therefore, they are one of the main instruments for full electronification of the transactions.

Creating a digital signature to a document is made using the private key, which is stored in the SSCD (Secure Signature Creation Device). The use of the private key when creating the signature ensures that they can not be cases of impersonation, as a user can sign only if he/she knows the private key.

  • Each signature is unique: Unlike handwritten signatures where the signature of a natural person is always the same, the digital signature is always different, unless the data we sign is the same. Thus, even a small change in a document will result in a completely different signature, but which is recognized solely as our own (since the verification is made by our corresponding public key which is unique).
  • Digital signatures provide authentication of the signatory's identity: Unlike handwritten signatures where counterfeiting is for the unscrupulous relatively an easy task, to create a valid digital signature without the knowledge of the private key is considered practically impossible. For this reason, the digital signatures are a safer way to verify the signer's identity, as if we are confident that the public key used to verify a signature belongs to a particular user, then the signature data is certainly from this user .
  • Digital signatures protect against data changes: When hand signing a document we know that in many cases it is possible to add some data and / or alteration of the existing ones. In the case of digital signatures is practically impossible. If we digitally sign a document, any alteration in the signed data will result in the detection by the signature verification process. A malicious user who wants to alter a document should have available the signature-creation data, ie. the private key of the signatory, to change a document and sign it again so as not to reveal his/her action. Therefore, if the malicious user does not have the required private key, he/she will be unable to change the data in a document without being perceived.


  • Information Technology Development Agency (Y.A.P.) (Greek text)
    ENTERCOM® suggests for your digital signature.
    Safenet 5100

    SafeNet eToken 5110

    Secure Signature Creation Device - smart card or usb token for Professionals (Lawyers, Engineers tee, etc.)

    Steps that I have to do to acquire my digital signature.
  • Procurement of an SSCD (Secure Signature Creation Device)
  • Online registration via ERMIS Gate
  • Go to KEP (Service center for citizens)
  • Prepare your computer
  • Install necessary programs
  • Issuing of digital certificates
  • Installation of digital certificates in eToken