Public Key Cryptography (3)
Digital Signatures
adding Authenticity
allows authentication of computers and people
used to verify authenticity of origin
Originator’s
Private Key
Cleartext
message
Cleartext
message
Encrypt
Decrypt
Originator’s
Public key
Previous slide
Next slide
Back to first slide
View graphic version