Abstract:
This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of message/file. The output is unique hash value. Sender encrypts this unique hash value with sender’s private key. The output is digital signature. And then, sender sends original message/file and it’s signature to receiver. In verifying process, receiver decrypts the signature with sender’s public key. The output is unique hash value. And receiver computes hash value of original message/file. If two hash values are equal, the content of message/file is not modified after signed and was sent by valid sender. If two hash values are not equal, the content of message/file is modified after signed and was sent by invalid sender.