Basic HTML version of Foils prepared
May 19 99
Foil 38 Digital Signatures and Public Key Cryptography
From
Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 --
Spring Semester 1999
.
by
Geoffrey Fox, Mehmet Sen
1
Digital Signatures reverse the use of public and private keys
2
You encrypt with the private and decrypt with the public key
3
Plaintext
4
Verification
5
Plaintext
6
Signing
7
Private Key
8
Public Key
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Wed May 19 1999