Basic HTML version of Foils prepared April 7 1998

Foil 68 Sample SET Cryptography Steps 2 to 5

From Basic Principles of Java and Internet Security CPS616 Web Technologies -- Spring 98. by Geoffrey C. Fox


2)Alice encrypts the message digest with her private signature key to produce the digital signature
3)She chooses a secret key encryption algorithm and generates a random symmetric(secret) key. This is used to encrypt an amalgam of 3 items:
  • Property description
  • Digital Signature
  • Copy of her certificate which contains her public signature key
4)Alice must already know Bob's "key-exchange" public key which would be in his certificate. Alice encrypts her random secret (symmetric) key with Bob's public key. This is referred to as the digital envelope
5)Alice sends to Bob a message containing 4 entities in 3) and 4) above



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Nov 29 1998