A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A. digital signature B. keystream

C. one way hash function D. secret key

A. digital signature

Computer Science & Information Technology

You might also like to view...

A full software installation enables you to choose which program features you want installed on your hard drive

Indicate whether the statement is true or false

Computer Science & Information Technology

SSD _______ technology stores more than one bit in each cell

Fill in the blank(s) with correct word

Computer Science & Information Technology