Page 128 - CISSO_Prep_ Guide
P. 128

The digital signature is appended to the end of the message we
            wish to send to Bob. Then message (with the attached digital
            signature) is encrypted using a symmetric algorithm.

            Then we encrypt the symmetric key used to encrypt the message
            with the public key of the recipient (Bob).































            We send the encrypted symmetric key and the encrypted
            message to Bob. This is called a digital envelope.

            When Bob gets the digital envelope, he will decrypt the
            symmetric key using his private key.
   123   124   125   126   127   128   129   130   131   132   133