PrepAway - Latest Free Exam Questions & Answers

which of the following answers is correct?

Regarding digital signature implementation, which of the following answers is correct?

PrepAway - Latest Free Exam Questions & Answers

A.
A digital signature is created by the sender to prove message integrity by encrypting the
message with the sender’s private key. Upon receiving the data, the recipient can decrypt the data
using the sender’s public key.

B.
A digital signature is created by the sender to prove message integrity by encrypting the
message with the recipient’s public key. Upon receiving the data, the recipient can decrypt the
data using the recipient’s public key.

C.
A digital signature is created by the sender to prove message integrity by initially using a
hashing algorithm to produce a hash value or message digest from the entire message contents.
Upon receiving the data, the recipient can independently create it.

D.
A digital signature is created by the sender to prove message integrity by encrypting the
message with the sender’s public key. Upon receiving the data, the recipient can decrypt the data
using the recipient’s private key.

Explanation:
A digital signature is created by the sender to prove message integrity by initially
using a hashing algorithm to produce a hash value, or message digest, from the entire message
contents. Upon receiving the data, the recipient can independently create its own message digest
from the data for comparison and data integrity validation. Public and private are used to enforce
confidentiality. Hashing algorithms are used to enforce integrity.


Leave a Reply