In the first part about digital signatures we dealt with the different forms of signatures and had taken up the question to what extent a document with a digital signature is legally valid. This second part deals with the underlying encryption technique. In connection with a digital signature one often speaks of a so-called “key