O'Reilly logo

Simple Steps to Data Encryption by Peter Loshin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

More About Signatures

“Explain to me again what a signature actually is. Because when I sign a file, the output seems to be encrypted, not just signed,” says Bob as the conversation turns back to cryptography. Though Sam’s earlier comments about Alice bother him, Bob knows better than to let it get to him, at least not yet.

“One thing to remember,” says Sam, “GnuPG gives you three ways to sign, and two of those produce what looks like encrypted output.”

5.1 “Decrypting” a Digital Signature

Sam says: “Consider GnuPG’s roots as a tool for facilitating communication in the early Internet, and it’s obvious why GnuPG compresses output. That’s what you did when generating files transmitted over a network back in 1991 or so, because networks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required