Multiple Choice
When Bob needs to send Alice a message with a digital signature,whose private key is used to encrypt the hash?
A) Bob's private key
B) Alice's private key
C) Bob and Alice's keys.
D) Bob's private key and Alice's public key.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q27: What is a pseudorandom number generator?
Q28: Asymmetric cryptographic algorithms are also known as
Q29: Explain how a hash algorithm works and
Q30: Data that is in an unencrypted form
Q31: What cryptographic method,first proposed in the mid-1980s,makes
Q33: What is meant by the phrase "security
Q34: How does a downgrade attack work?
Q35: What type of cipher takes one character
Q36: GNU Privacy Guard a proprietary software that
Q37: How does asymmetric encryption work?