First page Back Continue Last page Graphics
Authentication
Sender creates a message
Generate a hash code with SHA-1
Using sender’s private key and RSA, encrypt the hash code and prepend to the message
Receiver uses sender’s public key to decrypt and recover the hash code
Receiver generates a new hash code for the message and compares with the decrypted hash code. If matching, then message is authentic