A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
A. digital signature B. keystream
C. one way hash function D. secret key
A. digital signature
Computer Science & Information Technology
You might also like to view...
A full software installation enables you to choose which program features you want installed on your hard drive
Indicate whether the statement is true or false
Computer Science & Information Technology
SSD _______ technology stores more than one bit in each cell
Fill in the blank(s) with correct word
Computer Science & Information Technology