First page Back Continue Last page Overview Graphics
Application – authentication revisited
Rather than encrypting an entire document as a form of authentication, take a hash of the document and encrypt only that.
This is known as a digital signature.
Remember, only the holder of the private key can encipher a message which can be decrypted with the public key.
Digital signatures have a number of applications including e-commerce and declarations of identity (certificates).