The __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.

A. timestamp
B. message digest
C. hash code
D. digital signature

D. digital signature

Computer Science & Information Technology

You might also like to view...

When using shading, the user can use the Apply to box to select the part of the document where the shading will be applied

Indicate whether the statement is true or false

Computer Science & Information Technology

A USB 2.0 port is normally __________ in color

Fill in the blank(s) with correct word

Computer Science & Information Technology