Page 129 - CISSO_Prep_ Guide
P. 129

Bob uses the symmetric key to decrypt the message and the
            attached digital signature.

            Bob decrypts the digital signature with Alice's public key and
            finds the hash of the message signed by Alice.

            Bob creates a hash of the message he decrypted using the same
            has an algorithm that Alice used.

            Bob compares the hash value he created with the one sent and
            signed by Alice. If the hash values are identical, then Bob knows
            he has an authentic copy of the message from Alice.
   124   125   126   127   128   129   130   131   132   133   134