Page 123 - CISSO_Prep_ Guide
P. 123

The problem with a simple hash operation like this is that the
            message and the digest of the message can still be altered by a
            malicious person in the middle of the transmission path.
            Therefore the solution is to combine two functions to protect
            both the message digest and to provide proof of the origin of the
            message.



            Digital Signatures
            A digital signature combines a hash function with asymmetric
            encryption. The hash function provides proof of integrity,
            whereas the process of encrypting the hash of the message with
            a private key does two things - it protects the hash from
            alteration and provides proof of origin of the message.
   118   119   120   121   122   123   124   125   126   127   128