TD 92685EN
28 June 2012 / Ver. A
Troubleshooting Guide
Ascom i62 VoWiFi Handset
70
Appendix C: Digital
the correct key, converts the ciphertext back into plaintext. Public key algorithms use paired
keys, one for encryption and another for decryption.
C.2.2 Authentication
Authentication is the verification of
a message’s sender. This requires the message to be
protected so it cannot be altered, usually by generating a digital signature formed by a hash
of the message. Only the correct key can generate a valid signature.