Joe received a digitally signed message from Grace What cryptographic key should he use to verify that digital signature?

a. Grace's public key
b. Grace's private key
c. Joe's public key
d. Joe's private key

Answer: a. Grace's public key

Computer Science & Information Technology

You might also like to view...

In a document, you should use tables to eliminate widows and orphans

Indicate whether the statement is true or false

Computer Science & Information Technology

________ is the horizontal width of a column

Fill in the blank(s) with correct word

Computer Science & Information Technology