Digital Signature
In this post, we will discuss about digital signature a widely used technique in computer security.
Digital Signature Algorithm
In cryptography digital signature present the authenticity of digital messages or documents. It follows the following steps- Generate Key: We use Some algorithm to generate a public key and private key
- Signing: We sign our documents or message with an algorithm that take private key and message string as input and gives a tag as output
- Verify: We use an algorithm on the recipient side to check the authenticity of a document or message. This algorithm takes a tag, private key and documents or message string as input and returns accepted or rejected i.e document is correct or not.
- Hashing: This is a set of an algorithm which takes an input string and return a fix length hash value know as a message digest.
- Hashing Algorithms
- MD5
- SHA-0
- SHA-1
- SHA-2
- SHA-3

Comments
Post a Comment