Common Data Security Architecture (CDSA) White Paper

Chapter 1 25
Common Data Security Architecture (CDSA) White Paper
Cryptography Service Provider (CSP) API
Figure 1-7 Authenticating a Digital Signature
A:
B
A:
[1]
[2]
B:
A:
[3]
hash
A’s hash of A’s data
[5]
B:
[6]
B:
[8]
B:
Identical?
A’s data
A’s data
A’s private key
A
encrypted symmetric key,
encrypted symmetric key
A’s encrypted data
A’s encrypted data
B’s private key
B
A’s public key
A
A’s hash of A’s data A’s digital signature
A’s digital signature,
A’s digital signature
symmetric key
symmetric key
[4]
hash
B’s hash of A’s dataA’s data
[7]
B:
A’s hash of A’s data
A’s hash of A’s data B’s hash of A’s data