【正文】
ing B’s public key. – 4. B decrypts the message using B’s private key. PublicKey Encryption and Digital Signatures () ? Publickey Authentication (Fig. ) – 1. A sends B a message encrypted with A’s private key. – 2. B decrypts the message using A’s public key. – 3. Entire message acts as a digital signature, since only A could have encrypted the message. PublicKey Encryption and Digital Signatures () ? Digital Signatures – Instead of the entire message, a small block can be used. – This block, the authenticator, can then be encrypted using the sender’s private key. – This serves as a signature that verifies origin, content, and sequencing. – SHA1 could serve as the authenticator. PublicKey Encryption and Digital Signatures () ? The RSA PublicKey Encrypti