The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication
A. key ID of the sender's public key
B. timestamp
C. filename
D. leading two octets of message digest
D
Business