COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Symmetric key Cryptography
|
|
Asymmetric key Cryptography
|
|
Hashing Cryptography
|
|
None of the above
|
Detailed explanation-1: -Digital signatures rely on asymmetric cryptography, also known as public key cryptography. An asymmetric key consists of a public/private key pair. The private key is used to create a signature, and the corresponding public key is used to verify the signature.
Detailed explanation-2: -Hash functions are used to “digest” or “condense” a message down to a fixed size, which can then be signed, in a way that makes finding other messages with the same hash extremely difficult (so the signature wont apply easily to other messages).
Detailed explanation-3: -About Signature Hashing There are three supported algorithms: SHA-1-The default hashing algorithm applied to each signature item in the configuration. SHA-256-A more complex, but slower hashing algorithm when compared with SHA-1. Adler-32-A lighter weight hashing algorithm when compared to SHA-1.
Detailed explanation-4: -Click review and sign link in email. In the email you received from the sender of the document to sign, click the link labeled “Click here to review and sign ‘’ Click prompt in document. Create electronic signature. Select signature option. Sign document. Finalize signature. Send.