When crafting a digital signature, what are the initial steps in the process performed by the sender?

A. Encrypt the message with a symmetric key.
B. Sign the message with the recipient's public key.
C. Hash the message, and then encrypt the message with the private key.
D. Hash the message, and then encrypt the digest with the private key.

Answer: D. Hash the message, and then encrypt the digest with the private key.

Computer Science & Information Technology

You might also like to view...

If a date is typed as 7-5-17, Excel will complete it as ________

A) 7/5/2017 B) Jul-17 C) 5-Jul-17 D) Jul-5-17

Computer Science & Information Technology

Which operator is used to include rows in the result set that did not meet the condition of the predicate?

a. IS b. ANY c. NOT d. ALL

Computer Science & Information Technology