Loading...
Select Version
&pagelevel(4)&pagelevel
In addition to ensuring data integrity, cryptographic hash algorithms are used to create digital signatures. For this purpose a hash value (message digest) is first calculated from a plain text, and this is then encrypted with a private key. Digital signatures are suited particularly for securing non-repudiation.
For security reasons, the minimum length of the public key used should be 2048 bits.