Hi. I don't know if this question can be considered within the scope
of this course (it can be considered as related to the Web-tier
Security topic), but I can't find any satisfying answer in the Web. I
know well how a digital signature works:

Signer:
1) The message is first processed by a hash function to create a hash.
2) The hash is encrypted using the private key
3) The message and the encrypted hash are sent.

Verifier:
1) The message is processed through the same hash function used by the
signer.
2) The hash is decrypted with the signer's public key.
3) The recently hashed message and the decrypted hash are compared to
verify the signature.

The question that I can't get out of my head is: why is it necessary
to hash the message? Why can't it only be enough with encrypting the
message?

Thanks

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Java 
EE (J2EE) Programming with Passion!" group.
To post to this group, send email to 
java-ee-j2ee-programming-with-passion@googlegroups.com
To unsubscribe from this group, send email to 
java-ee-j2ee-programming-with-passion+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/java-ee-j2ee-programming-with-passion?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to