26

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Footnote 26

This transformation is sometimes described as "encryption," which is inaccurate terminology, because the message itself does not need to be confidential. Confidentiality can be provided as an optional feature of digital signature technologies, but the separate and distinct security service of confidentiality is not central to the security services of signer authentication and document authentication, and is thus outside the scope and focus of these guidelines.