All of the following statements about public key cryptography are true except:
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.
B
You might also like to view...
If you are driving an older car, it may be worthwhile for you to
A) drop your family auto policy if state law permits. B) drop your collision coverage. C) drop only your other-than-collision. D) drop both your collision and other-than-collision coverage.
________ design transforms the conceptual model into a representation that shows how the components of the solution are logically related and interact
A) Physical B) Abstract C) Logical D) Concrete