PrepAway - Latest Free Exam Questions & Answers

which of the following answers is correct?

Regarding digital signature implementation, which of the following answers is correct?

PrepAway - Latest Free Exam Questions & Answers

A.
A digital signature is created by the sender to prove message integrity by encrypting the message with the
sender’s private key. Upon receiving the data, the recipient can decrypt the data using the sender’s public
key.

B.
A digital signature is created by the sender to prove message integrity by encrypting the message with the
recipient’s public key. Upon receiving the data, the recipient can decrypt the data using the recipient’s public
key.

C.
A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm
to produce a hash value or message digest from the entire message contents. Upon receiving the data, the
recipient can independently create it.

D.
A digital signature is created by the sender to prove message integrity by encrypting the message with the
sender’s public key. Upon receiving the data, the recipient can decrypt the data using the recipient’s private
key.

Explanation:
A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm to
produce a hash value, or message digest, from the entire message contents. Upon receiving the data, the
recipient can independently create its own message digest from the data for comparison and data integrity
validation. Public and private are used to enforce confidentiality. Hashing algorithms are used to enforce
integrity.


Leave a Reply