First page Back Continue Last page Overview Graphics
Can Provide Authentication
Reverse the use of the keys (encrypt with private and decrypt with public) and you can now authenticate who sent the message.
[[M]KBpriv]KBpub= M
- If B is the only person who holds the key Kbpriv then only B could have been the person to have encrypted M.