Securityandauthorization Database
Securityandauthorization Database
able to check that the signature does come from the originator.
A digital signature consists of a string of symbols.
Signature must be different for each use.
This can be achieved by making each digital signature a function of
the message that it is signing, together with a time stamp.
Public key techniques are the means creating digital signatures.