TOPIC 10: DIGITAL SIGNATURES

Screenshot (2064) D.SIG_.jpg

  • To achieve this we do DOUBLE AUTHENTICATION
  • That is, if A wants to send a message to B, A will first encrypt the message using their private key which is inaccessible to the public thus acting as a digital signature
  • The second encryption is done using B’s public key
  • For B to get the readable format, they will double decrypt, First with A’s public key then secondly with their own private key

ENG WANJIKU

Views: 24

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top