Which of the following is public keys used for?
Decrypting wireless messages
Decrypting the hash of an electronic signature
Bulk encryption of IP based email traffic
Encrypting web browser traffic
The sender uses the private key to create a digital signature. The message is, in effect, signed with the private
key. The sender then sends the message to the receiver. The receiver uses the public key attached to the
message to validate the digital signature. If the values match, the receiver knows the message is authentic.