Related: Signing
Verifies INTEGRITY (WHAT) and AUTHENTICITY (WHO)
Creating Digital Signature of an object
- Taking the hash of the data and digitally sign the hash with private key.
- Public key gets distributed wider so it’s becomes hard to alter it.
- Digitally signed data is created (let’s share it)
- Other party receives the data, they check signature and get exposed to the original hash
- Other party uses same hash function on the data if hashes are same, the data is same.
Trust public key ⇒ trust private key ⇒ trust entity ⇒ trust data
/Attachments/Pasted-image-20230121225109.png)