Signing and Verifying Messages
To apply a digital signature to a piece of data, a secure hash function is
used to build a digest of the data (for example, a 160-bit hash value) which is
then transformed with the private key of the signer. Other users can then check
the authenticity of the signature by reconstructing the hash value, and checking
it against the "inverse" of the digital signature data. CryptoAPI abstracts
out the actual method of doing the signature, so that applications need not be
aware of the signature mechanics.
- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers
- More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
- Databases for Amazon shops developers
-
Amazon Categories Database
Browse Nodes Database