A signed message takes the hash of the initial message(along with some other data) and signs it with the senders private key. That way anyone with access to the senders public key can verify the authenticity of the message. This is called non-repudiation.
Encryption and signing are opposite processes. This is also how IPSEC ESP and AH modes work. ESP encrypts AH signs. On May 15, 2014 1:23 PM, "Allan Irving" <[email protected]> wrote: > May sound a very basic basic question and it is. I'm familiar with PGP and > sending Bob a message as I know his public key. > > However, I receive messages sometimes that are signed yet have not > disclosed any keys and also, a few do so on this mailing list. > > Does this list have a key and auto-decryption before reaching my iPhone > for example? Or has the message just been signed with Adam's Public key, as > a way to imply ownership / genuinely coming from him? As opposed to being > signed by Bob's public key? > > I know this is a basic, basic question - but I'm completely confused on it. > > Any help appreciated / info. > > - Sent from my toaster using recycled electrons. > > *This message, and any attachments to it, may contain information that is > privileged, confidential, copyrighted and exempt from disclosure under > applicable law. If the reader of this message is not the intended > recipient, you are notified that any use, dissemination, distribution, > copying, or communication of this message is strictly prohibited. If you > have received this message in error, please notify the sender immediately > by return email and delete the message and any attachments. * > > _______________________________________________ > Discuss mailing list > [email protected] > https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss > This list provided by the League of Professional System Administrators > http://lopsa.org/ > >
_______________________________________________ Discuss mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/
