Short Answer
Bob uses his own private key to encrypt the message.When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob.No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key.Therefore the entire encrypted message serves as a _________ .
Correct Answer:

Verified
Correct Answer:
Verified
Q19: _ is a term used to describe
Q20: Cryptographic hash functions generally execute slower in
Q21: A _ is when the sender "signs"
Q22: The private key is known only to
Q23: In the ECB mode of encryption if
Q24: Public key algorithms are based on mathematical
Q25: Private key encryption is used to produce
Q26: As with symmetric encryption, there are two
Q28: Public key algorithms are useful in the
Q29: Protection against active attacks (falsification of data