Looking at the message, the first stage is for the recipient to write the message. Of course it is important to ensure that the content of the email will be understood by the recipient for communication to take place (Wandberg, 2014). Otherwise, the sender would have to rethink the choice of his or her means of communication.
Once the message has been composed, the sender builds two …show more content…
Hashing is cryptographic function that encrypts a piece of data. The purpose of hashing is to ensure that the email cannot be accessed by another person who is not the intended target. Besides, any hashed piece of data cannot be changed midstream. Therefore, it builds integrity in the message because of a set of keys, in this case the digest. If the message is tempered with, Bob is going to know because the keys or digest of the message that he receives will be different from the one Alice used to hash the message. Hence, Alice will have to compute the value of the hash of the message and send this to Bob together with the message. In this case, on receiving the message, what Bob will need to do, is to recompute the value of the hash, and compare to what Alice sent him. If the two match, then this is confirmation that the message actually came from Alice. This is a unique feature of hashing which ensures that there is integrity in communication. Hashing is different from the normal encryption function because with encryption, there is no guarantee of the integrity of the