Secrecy and Authenticity
For secrecy to exist the public key system must satisfy D ( E ( M ) ) = M
Authenticity is not supported by the above transformation but needs to employ a one way function
Use of Hash Functions and Message Digests
Previous slide
Next slide
Back to first slide
View graphic version