It then compares these two values. If they match, the recipient is assured that the originator knew the encryption key and that the message contents were not changed en route. There are several other techniques for providing digital signature
Wale Wahab runs the “Audit, Control & Security of Information Assets” Website, where he offers free e-book on how to perform electronic audit using CAAT Software. His site can be found at http://www.ultimatesystemssolutions.com/itauditebook.com/.
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |