Basic HTML version of Foils prepared
July 6 99
Foil 21 Public Key Cryptography (3)
From
Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track --
June 2 and June 7 99
.
by
Roman Markowski
1
Digital Signatures
adding Authenticity
allows authentication of computers and people
used to verify authenticity of origin
2
Originator's
3
Private Key
4
Cleartext
5
message
6
Cleartext
7
message
8
Encrypt
9
Decrypt
10
Originator's
11
Public key
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Tue Jul 6 1999