Sample SET Cryptography Steps 2 to 5
2)Alice encrypts the message digest with her private signature key to produce the digital signature
3)She chooses a secret key encryption algorithm and generates a random symmetric(secret) key. This is used to encrypt an amalgam of 3 items:
- Property description
- Digital Signature
- Copy of her certificate which contains her public signature key
4)Alice must already know Bob’s “key-exchange” public key which would be in his certificate. Alice encrypts her random secret (symmetric) key with Bob’s public key. This is referred to as the digital envelope
5)Alice sends to Bob a message containing 4 entities in 3) and 4) above