1 |
Verification
-
using her private key the recipient recovers the content-encryption key (recipient authentication)
-
using the recovered key she decrypts the message (privacy) and the message digest
-
she decrypts the message digest again using the signer public key (signer authentication)
-
she generates a new message digest and compare it with the decrypted one (integrity)
|