Common Data Security Architecture (CDSA) White Paper
Cryptography Service Provider (CSP) API
Figure | Authenticating a Digital Signature |
[1]
A:
A's data
hash
A's hash of A's data
[2]
A:
A
A's hash of A's data A's private key | A's digital signature |
|
|
[3]
A:
B
A's digital signature, encrypted symmetric key, | A's encrypted data |
|
|
[4]
B: B
B's private key | encrypted symmetric key | symmetric key |
|
|
|
[5]
B:
A's encrypted data | symmetric key | A's data |
|
|
|
[6]
B:
A's data
hash
B's hash of A's data
[7]
B:
A's digital signature
A
A's public key | A's hash of A's data |
[8]
B: |
|
|
|
|
|
|
| Identical? |
|
|
|
|
|
|
|
|
|
| |||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
A's hash of A's data |
|
|
| B's hash of A's data |
Chapter 1 | 25 |