OnlineWoerterBuecher.de
Internes

Lexikon


digital signature


Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption. The sender uses a one-way hash function to generate a hash-code of about 32 bits from the message data. He then encrypts the hash-code with his private key. The receiver recomputes the hash-code from the data and decrypts the received hash with the sender' s public key. If the two hash-codes are equal, the receiver can be sure that data has not been corrupted and that it came from the given sender. (1995-02-07)

In addition suitable contents:
[ 2 ] [ = ] [ ag ] [ al ] [ am ] [ an ] [ app ] [ ar ] [ arc ] [ as ] [ ash ] [ at ] [ au ] [ b ] [ be ] [ bi ] [ bit ] [ bo ] [ ca ] [ cat ] [ ch ] [ co ] [ code ] [ codes ] [ com ] [ cr ] [ crypt ] [ cryptography ] [ data ] [ de ] [ dec ] [ du ] [ E ] [ ec ] [ ed ] [ ee ] [ encryption ] [ er ] [ era ] [ es ] [ fi ] [ file ] [ fr ] [ function ] [ ge ] [ gen ] [ generate ] [ gi ] [ gr ] [ graph ] [ h ] [ hash ] [ hash function ] [ hat ] [ hr ] [ id ] [ ie ] [ il ] [ in ] [ io ] [ is ] [ it ] [ ke ] [ key ] [ Lex ] [ li ] [ message ] [ mo ] [ mod ] [ module ] [ mp ] [ na ] [ nc ] [ ne ] [ ng ] [ no ] [ om ] [ one-way hash function ] [ pe ] [ ph ] [ pr ] [ pt ] [ public-key encryption ] [ query ] [ rc ] [ re ] [ ro ] [ ru ] [ sa ] [ se ] [ sh ] [ si ] [ su ] [ T ] [ th ] [ to ] [ tr ] [ tw ] [ ua ] [ up ] [ us ] [ va ] [ ve ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (3836 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.0836 Seconds, with 17 Database-Queries
Zurück zur Startseite