Public Key Cryptography (4)
Adding Integrity and Non-Repudiation
Hash functions (result cannot be decrypted): create unique fingerprint of the original message
Message
digest
Originator’s
Private Key
Encrypt
Originator’s
Public key
Decrypt
Message
digest
Message
digest
compare
Originator’s message
Originator
Recipient
Previous slide
Next slide
Back to first slide
View graphic version