Discover Cryptography News
Introduction to Digital Signatures in Java
Once the data is signed, you send the receiver the data and signature. You must supply the receiver with the public key corresponding to the private key you used to generate the signature. The receiver imports the public key then uses the key to verify integrity. The receiver can verify by grabbing the object, initializing it for verification, processing the data, and then comparing the signature.
The link for this article located at EarthWeb is no longer available.