Hash function creates a compressed image of M, called digest, to check the integrity.
(2) RSA signature
use sender's private key to encrypt hash(M)
use receiver's public key to encrypt E(E(hash(M))+M)
use receiver's private key to decrypt
use sender's public key to decrypt hash(M) and verify the integrity
Weakness:
security depends on the sender's private key
sender still deny signing a M
(use Timestamp)
private key may be stolen
(use digital certificate)
(3) DSA
digital signature algorithm
use public key
not for key exchange or encryption
(4) Summary
for RSA, hash(M)-> signature (hash(M)) -> Encrypt (signature (hash(M))+M)
for DSA, only for digital signature and use a secrete hash function.
They are both for integrity.(hash function)
(1) Digest Hash function creates a compressed image of M, called digest, to check the integrity.(2) RSA signatureuse sender's private key to encrypt hash(M)use receiver's public key to encrypt E(E(ha