Implementation of Digital Signature names that do not need to be kept confidential in the original text
1. Sender A performs hash operations on the original text to obtain the digital digest MD
2. Sender A encrypts the MD with its own private key to obtain the digital signature DS
3. Send the original text and DS together to receiver B
4. The receiver B decrypts ds with the public key of a to obtain the MD, and performs hash operations on the original text.
5. Compare the calculated MD value with the decrypted MD value. Matching is successful.
Original Text confidentiality digital signature and implementation method
1. The sender performs hash operations on the original text to obtain the number abstract MD
2. Sender A uses its own private key to encrypt MD to get DS
3. The sender uses the symmetric key sk of the ides symmetric algorithm to encrypt the public key of the original SD and A to obtain the encrypted information e.
4. Sender A encrypts the symmetric key Sk with the public key of receiver B to form a digital envelope de
5. Sender A sends encrypted information e and envelope de to receiver B
6. The receiver B decrypts the envelope with its own private key to get SK.
7. The receiver B decrypts information e using SK to obtain the public key of the original text, SD, and.
8. Use the public key of a to decrypt the SD file to obtain the original MD file.
9. The receiver B performs the hash operation on the original text to obtain the md'
10. If MD is equal to MD, the data is not tampered with and the signature is true.