Section B
Section B
1. Digital Signatures
• Authenticity: Verifies that the message was sent by the claimed sender.
• Integrity: Confirms that the data has not been altered during transmission.
• The hash is encrypted with the sender’s private key to create the digital
signature.
2. Verification:
• The recipient decrypts the signature using the sender’s public key to retrieve
the hash.
• The recipient then hashes the received message and compares it with the
decrypted hash. If they match, the message is verified.
Applications
• Secure Email: Ensures emails are sent by verified individuals (e.g., S/MIME).
2. The recipient decrypts the data with their private key, ensuring only they can
access the information.
1. RSA (Rivest-Shamir-Adleman):
• Applications: Digital signatures, secure web traffic (HTTPS), and secure email
(PGP).
Applications of PKC