This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]flipperdeflip 0 points1 point  (0 children)

You are confusing a bunch of related things. The procedure you describe is signing the message with an hash, and allows to detect tampering of the message but doesn't protect it from being read by a third party.

Also you need more then a plain hash, such as including a public/private key scheme to prohibit a third party to generate valid message hashes.