From Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 -- Spring Semester 1999. byGeoffrey Fox, Mehmet Sen
Alice wishes to sign a property description and send to Bob
There are 10 steps
1)Run property description through hash algorithm to get a message digest to use later to assure integrity of message.
This is digital fingerprint of property description