Basic HTML version of Foils prepared May 19 99

Foil 100 Sample SET Cryptography Steps 7-10

From Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 -- Spring Semester 1999. by Geoffrey Fox, Mehmet Sen


7)Bob uses the secret key to decrypt property description, Alice's signature and her certificate
8)Bob decrypts Alice's digital signature with her public key which he gets from her certificate. This recovers message digest (which is 160 bit) of property description
9)Bob uses same hash algorithm as Alice on her property description. He produces a new message digest of the decrypted property description
10)Bob compares his calculated with transmitted message digest
  • If they are exactly the same, then the material was not altered in transit and indeed came from Alice!
  • If they are not the same, notify authorities



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed May 19 1999