[email protected] (Kenneth Goldman/Watson/IBM@IBMUS) wrote on
11/18/2013 10:03:29 AM:
> Do not encrypt with a private key. Encrypt with the public key and
> decrypt with the private key.
Encrypt with a private key for integrity purposes: this shows that the data
that was encrypted corresponds to the owner of the key.
Encrypt with a public key for confidentiality purposes: this shows that the
data can only be received by the owner of the key.
I think in this case the trick would be to encrypt a cryptographically
sound hash of the source code.
--woody
--
Dr. Robert "Woody" GBS Cybersecurity &
Weaver Privacy
IT Security Architect Cell: 301-524-8138
--
If you are going to walk on thin ice, you may as well dance.