Completion requirements
View
This video further discusses digital signatures and various algorithms used to implement them in practice. The two key elements to pay attention to are the use of the hash function and the private key to encrypt. The mixture of these elements leads to the ability to authenticate and achieve non-repudiation.
Source: Steven Gordon, https://www.youtube.com/watch?v=dJYRBX7a7MM This work is licensed under a Creative Commons Attribution 3.0 License.