Illustrative Example: The Role of Encryption and Hashing in E-Business
Figure 7-8 uses the example of Northwest Industries submitting a competitive bid to provide services to a local government agency to illustrate how hashing, symmetric encryption, and asymmetic encryption techniques are all used together in an e-business transaction. The example assumes that both Northwest Industries and the government agency have previously acquired digital certificates from a mutually trusted certificate authority.