Who did this?
Such a "digital signature" can also be used
to prove that a message comes from you
to prove that data/software has not been corrupted or altered
to help identify someone else
Encryption allows us to produce such a "digital signature"
Previous slide
Next slide
Back to the first slide
View Graphic Version