Regarding digital signature implementation, which of the following answers is correct?

Posted by: Pdfprep Category: CISA Tags: , ,

Regarding digital signature implementation, which of the following answers is correct?
A . A digital signature is created by the sender to prove message integrity by encrypting the message with the sender’s private key. Upon receiving the data, the recipient can decrypt the data using the sender’s public key.
B . A digital signature is created by the sender to prove message integrity by encrypting the message with the recipient’s public key. Upon receiving the data, the recipient can decrypt the data using the recipient’s public key.
C . A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm to produce a hash value or message digest from the entire message contents. Upon receiving the data, the recipient can independently create it.
D . A digital signature is created by the sender to prove message integrity by encrypting the message with the sender’s public key. Upon receiving the data, the recipient can decrypt the data using the recipient’s private key.

Answer: C

Explanation:

A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm to produce a hash value, or message digest, from the entire message contents. Upon receiving the data, the recipient can independently create its own message digest from the data for comparison and data integrity validation. Public and private are used to enforce confidentiality. Hashing algorithms are used to enforce integrity.

Leave a Reply

Your email address will not be published.