SEOTrance
SiteMap
ebusiness Architecture
ebusiness Concepts
ebusiness Solutions
ebusiness Technology
ecommerce Fundamentals
ecommerce Implementation
Ecommerce Security
«Prev
Ecommerce Concepts
Ecommerce Fundamentals
Define ecommerce
ecommerce Business Models
Model Basics
Commerce Technology
Compare ecommerce
ecommerce Risks
ecommerce Issues
Intellectual Property
ecommerce Advantages
Fundamentals Review
ecommerce Business Models
Creating Storefronts
Keeping Customers Satisfied
one To One Marketing
eprocurement Supplier
Filling ecommerce Orders
Payment Processing
b2c Supply Web
b2b Supply Web
ecommerce Company Conclusion
Internet Law
Electronic Publishing
Copyright Law
Feist versus Rural
Trademark Issues
Patent Issues
Privacy Confidentiality
electronic Publishing Challenges
Internet Law Conclusion
Ecommerce Security
Secure Electronic Transactions
ecommerce Security Purpose
Encryption | Decryption
Encrypted Data Attacks
Fending Off Attacks
Authentication Methods
Identify Certification Methods
ecommerce Security Payoff
Authentication process
A cryptographic algorithm uses a cipher to encrypt and decrypt the plaintext messages. A cipher is a mathematical function. The keys are the number or values that are used in this mathematical function or cipher.
The message is transmitted electronically. At the destination, the receiver uses the same mathematical function to produce a message digest.
Using the sender's public key, the receiver verifies that the message digest matches the decrypted signature. If they match, the receiver knows that the message came from the purported sender and that it has not been altered in transit.