Secure Verified Data
A signs the message using A's private key
A encrypts the cipher using B's public key
Result can only be decrypted using B's private key (secure)
Can then be verified by A's public key
Slide 61
©Copyright 1997
Jan Newmarch