Please enable JavaScript.
Coggle requires JavaScript to display documents.
Module 17: Public Key Cryptography, image, image, image, image - Coggle…
-
Bob confirms the order and his computer creates a hash of the confirmation. The computer encrypts the hash with Bob’s private key. The encrypted hash, which is the digital signature, is appended to the document. The order confirmation is then sent to Alice over the internet.
Alice’s receiving device accepts the order confirmation with the digital signature and obtains Bob’s public key.
Alice’s computer then decrypts the signature using Bob’s public key. This step reveals the assumed hash value of the sending device.
Alice’s computer creates a hash of the received document, without its signature, and compares this hash to the decrypted signature hash. If the hashes match, the document is authentic. This means the confirmation was sent by Bob and that it has not changed since it was signed.
-
-