First page Back Continue Last page Overview Graphics
Application – authentication revisited
- Rather than encrypting an entire document as a form of authentication, take a hash of the document and encrypt only that. 
- This is known as a digital signature.
- Remember, only the holder of the private key can encipher a message which can be decrypted with the public key.
- Digital signatures have a number of applications including e-commerce and declarations of identity (certificates).