Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob
No one else has Bob's
private key and therefore no one else could have created a ciphertext that could
be decrypted with Bob's public key. Therefore the entire encrypted message
serves as a _________ . ?
What will be an ideal response?
DIGITAL SIGNATURE
Business
You might also like to view...
A correlation coefficient, an index number constrained to fall between the range of -1.0 and +1.0, communicates both the strength and the direction of association between three or more categorical variables
Indicate whether the statement is true or false
Business
In regression, the variable being predicted, x, is known as the dependant variable
Indicate whether the statement is true or false
Business