Sample SET Cryptography Use
Alice wishes to sign a property description and send to Bob
1)Run property description through hash algorithm to get a message digest to use later to assure integrity of message.
- This is digital fingerprint of property description