Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file?
Joe’s public key
Joe’s private key
Ann’s public key
Ann’s private key
The sender uses his private key, in this case Ann’s private key, to create a digital signature. The message is, in
effect, signed with the private key. The sender then sends the message to the receiver. The receiver uses the
public key attached to the message to validate the digital signature. If the values match, the receiver knows the
message is authentic.
The receiver uses a key provided by the sender—the public key—to decrypt the message.
Most digital signature implementations also use a hash to verify that the message has not been altered,
intentionally or accidently, in transit.