... describe the foundation for our work, cryptography, andthen describe the model we will be working in, namely Public Key Infrastructure(PKI). We proceed by discussing the Domain Name System, ... encrypted using the private key, which generates the signature.On the receiving end, the verification procedure is performed. The verificationprocedure consists of computing the hash value of the input ... receiver.One of the first suggested and still most commonly used public key ciphers is the RSA cipher [88]. The security of the RSA cipher depends on the difficulty offinding the prime factorization...