Basic HTML version of Foils prepared July 6 99

Foil 22 Public Key Cryptography (4)

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski


1 Adding Integrity and Non-Repudiation
2 Hash functions (result cannot be decrypted): create unique fingerprint of the original message
3 Message
4 digest
5 Originator's
6 Private Key
7 Encrypt
8 Originator's
9 Public key
10 Decrypt
11 Message
12 digest
13 Message
14 digest
15 compare
16 Originator's message
17 Originator
18 Recipient

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999