First page Back Continue Last page Overview Graphics
Application – authentication revisited
Rather than encrypting an entire document as a form of authentication, take a hash of the document and encrypt only that. 
 
This is known as a digital signature.
 
Remember, only the holder of the private key can encipher a message which can be decrypted with the public key.
 
Digital signatures have a number of applications including e-commerce and declarations of identity (certificates).