Digital Signatures
Intro In the previous article, we introduced asymmetric encryption, and particularly the use of public key encryption for transmitting secrets. In this article, we shall take a look at digital signatures, another application of asymmetric encryption. In public key encryption, we used the recipient’s public key to encrypt the message in transit so that only the recipient could decrypt it using their private key. In a digital signature system, the sender encrypts the message with their private key producing a signature.
Read more...