6
6
Select the arrows to learn how a digital signature works in this case.
- Create a message and encrypt it with a private key: Alice creates the
message along with a digest of the message. She then encrypts this
digest with her private key.
- Send the encrypted message with a public key: Alice bundles the
message, the encrypted message digest and her public key together to
create the signed document. Alice sends this to Bob.
- Read the encrypted message using the public key: Bob receives the
message and reads it. To make sure that the message came from Alice,
he creates a message digest. He takes the encrypted message digest
received from Alice and decrypts it using Alice’s public key. Bob
compares the message digest received from Alice with the one he
generated. If they match, Bob knows that he can trust that no one
tampered with the message.