EasyManua.ls Logo

ASCOM I62 - Page 73

ASCOM I62
80 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
TD 92685EN
28 June 2012 / Ver. A
Troubleshooting Guide
Ascom i62 VoWiFi Handset
70
Appendix C: Digital
the correct key, converts the ciphertext back into plaintext. Public key algorithms use paired
keys, one for encryption and another for decryption.
C.2.2 Authentication
Authentication is the verification of
a message’s sender. This requires the message to be
protected so it cannot be altered, usually by generating a digital signature formed by a hash
of the message. Only the correct key can generate a valid signature.

Table of Contents

Other manuals for ASCOM I62

Related product manuals