Generic Digital Signature Process

  1. The signature processor calculates a hash code for some data using a strong, one-way hash function.

  2. The processor encrypts the hash code using a private key.

  3. The verifier calculates the hash code for the data it's received.

  4. It then decrypts the encrypted hash code using the public key to see if the hash codes match.


Previous | Next | Top | Cafe con Leche

Copyright 2007 Elliotte Rusty Harold
elharo@metalab.unc.edu
Last Modified March 15, 2002