How are message digests used in information security?

1 Most importantly, the digest should be unchanged during the transmission. 2 The cryptographic hash function is a one way function, that is, a function which is practically infeasible to invert. … 3 Message digest ensures the integrity of the document. To provide authenticity of the message, digest is encrypted with sender’s private key. …
For More Information Please Refer:


You May Also Like to Read: