Bill, Probably. Unfortunately, if someone decrypts the hash with your public key (presumably posted somewhere) and it doesn't match the hash from the plain text, somebody is likely to get suspicious. Especially as they know that they have intercepted the original (presumably untainted) message directly from you. Dave William Chops Westfield wrote: > On Jul 23, 2004, at 12:01 PM, Randy Glenn wrote: > >> That's the thing about digital signatures - you don't encrypt the >> message, you hash the message and encrypt that. This encrypted hash is >> appended to the message. > > > Cool. Can I disguise industrial espionage data as digital signatures? > > BillW > > -- > http://www.piclist.com#nomail Going offline? Don't AutoReply us! > email listserv@mitvma.mit.edu with SET PICList DIGEST in the body > > -- http://www.piclist.com#nomail Going offline? Don't AutoReply us! email listserv@mitvma.mit.edu with SET PICList DIGEST in the body