When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?
A) Bob's private key
B) Alice's private key
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.
Correct Answer:
Verified
Q29: In cryptography,which of the five basic protections
Q30: If Bob receives an encrypted reply message
Q31: What term best describes when cryptography is
Q32: What widely used commercial asymmetric cryptography software
Q33: What term describes data actions being performed
Q35: Which of the following are considered to
Q36: Which of the following is more secure
Q37: What is the U.S.federal government standard for
Q38: What alternative term can be used to
Q39: What cryptographic method,first proposed in the mid-1980s,makes
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents