1 |
Here B starts with a document that it is required to prove only could come from B
|
2 |
This could be a piece of software that we wish to know comes from a reputable source
|
3 |
We combine software with a "certificate" (a statement that B is Bob) and either encrypt this with dB or more normally encrypt a message digest (or hash that depends on both message and signature) with dB
|
4 |
This use of a message digest is done for performance as it is time consuming to use public key encryption on full message
|
5 |
Note this signature cannot be forged either by A or any other person pretending to be B.
-
In secret key version A shares B's secret key and can forge messages that purport to be from B
|