We the first equation we considered when looking at public/private key cryptography was
(Recall
and
are inverses)
And we looked at how this enabled private messages to be sent across an insecure channel. Now consider the equation
This represents Alice encrypting a message () using her secret
key. Anybody can now decrypt the message using her public key, but since
only Alice can use
they can be sure it was her who encrypted the
message. Suppose Alice didn't want to hide the message, merely provide
a means for people to verify it was her who sent it. She could send both
the origional message,
, and
. Clearly anybody can read
and anyone who bothers to find Alice's public key can apply
to
. If the result of this matches
they can be reasonably sure
it was Alice who sent the message, so by providing
with the
message Alice has `signed' it.
Of course transmitting
and
is a waste, since we are now
sending a message that is twice as long as
.