Digital Signatures using Public Key Cryptography
In this lesson, we will see how to ensure the recipient of one's identity using public key cryptography.
We'll cover the following...
Let’s continue with the previous example. Where Bob receives a message, which when he decrypts says “Meet me at 11:00 tomorrow”. How can Bob know for sure that the message was sent by Alice and not Chris?
This can be achieved if the message is “signed” by its sender (Alice). The receiver of the message can then verify the signatures.
We need a way for Alice to “digitally sign” the message so the receiver of the message (Bob) can trust that the message was sent by Alice. Alice can add a digital ...