PrepAway - Latest Free Exam Questions & Answers

which of the following answers is correct?

Regarding digital signature implementation, which of the following answers is correct?

PrepAway - Latest Free Exam Questions & Answers

A.
A digital signature is created by the sender to prove message integrity by encrypting the message
with the sender’s private key. Upon receiving the data, the recipient can decrypt the data using the
sender’s public key.

B.
A digital signature is created by the sender to prove message integrity by encrypting the message
with the recipient’s public key. Upon receiving the data, the recipient can decrypt the data using the
recipient’s public key.

C.
A digital signature is created by the sender to prove message integrity by initially using a hashing
algorithm to produce a hash value or message digest from the entire message contents. Upon
receiving the data, the recipient can independently create it.

D.
A digital signature is created by the sender to prove message integrity by encrypting the message
with the sender’s public key. Upon receiving the data, the recipient can decrypt the data using the
recipient’s private key.

Explanation:
A digital signature is created by the sender to prove message integrity by initially using a hashing
algorithm to produce a hash value, or message digest, from the entire message contents. Upon
receiving the data, the recipient can independently create its own message digest from the data for
comparison and data integrity validation. Public and private are used to enforce confidentiality.
Hashing algorithms are used to enforce integrity.


Leave a Reply