Reference to this blog:
Introduction to RSA encryption algorithm
basic knowledge of digital signature
1. Digital signatures and data encryption are required to use the RSA and other asymmetric encryption algorithm
Where the digital signature is the sender with the private key encryption, the receiver with the public key decryption, because the private key is only the sender, so you can guarantee the identity of the sender.
Data encryption in the communication is the opposite, the sender with the public key encryption, only the recipient has the private key to decrypt the data, thus ensuring that the data will not be acquired by a third party.
2. Digital signature, the message sent to the receiver often contains a digital certificate, which mainly contains the sender's private key corresponding to the public key, the receiver can use this public key to decrypt.
3. MD5, Sha are one-way hash functions that are often used to generate summaries of information when digitally signed, and the summaries generated by these functions are fixed-length.
One-way hash functions are also frequently used in cryptographic password of passwords in applications.
4.