18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

298 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

When the receiver gets the message, it performs the following<br />

actions:<br />

1. It decrypts the message using its private key (see Figure 10.7). Now<br />

what it sees is the digital signature and the original message file.<br />

2. It re-computes the 'digest' from the original file, using the same hash<br />

algorithm.<br />

3. It decrypts the digital signature using the sender's public key.<br />

4. It then compares the decrypted digital signature with the digest that it<br />

just computed.<br />

5. If the two are exactly the same, the receiver is assured that the<br />

message was not changed en route and also that the sender's identity<br />

is proved (as the sender's private key was involved in the process;<br />

see Figure 10.8).<br />

Receiver's<br />

Private Key<br />

Secured Message<br />

Received<br />

Message<br />

Digital<br />

Signature<br />

Figure 10.7. — Decryption using digital signature<br />

Hash<br />

Function Sender's Public<br />

Key<br />

Message<br />

Digital<br />

+ Signature<br />

Message Message<br />

Digest Digest<br />

Pass/<br />

Fail<br />

Figure 10.8.<br />

message<br />

Ensuring integrity of the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!