Encryption: XML Digital signatures in a nutshell
"Digitally signing a document requires the originator to create a hash of the message itself and then encrypt that hash value with his own private key. Only the originator has that private key, and only he can encrypt the hash so that it can be unencrypted using his public key.The recipient, upon receiving both the message and the encrypted hash value, can decrypt the hash value, knowing the originatorís public key.The recipient must also try to generate the hash value of the message and compare the newly generated hash value with the unencrypted hash value received from the originator. If the hash values are identical, it proves that the originator created the message, because only the actual originator could encrypt the hash value correctly.
(Submitted by Noel Fri Jun 18, 2004 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author