Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. user generate RSA key pairs
  2. dovetail generate  a random secret key
  3. encrypt this report with this secret key by AES256 encryption algorithm
  4. encrypt this secret key with RSA public key by RSA encryption algorithm
  5. vendor generate RSA key pairs
  6. dovetail generate a digest from report with MD5
  7. encrypt digest with private key from vendor
  8. send encrypted report, encrypted digest, encrypted key to your target user
  9. the receiver decrypt the secret key with his own RSA private key to get original secret key
  10. the receiver decrypt the report with this secret key to get the plain-text report
  11. the receiver decrypt the digest with vendor's public key to get original digest
  12. the receiver generate a digest from report with MD5 get new digest
  13. the receiver check if original digest and new digest are the same with each other

Image RemovedImage Added