COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How does the receiver of a message use the digital signature to verify that the message has not been tampered with?
A
Decrypt the signature with the sender’s private key and compare with a hash of the received message
B
Decrypt the signature and unhash it to see if it is the same as the received message
C
Telephones the sender to request confirmation
D
Hashes the encrypted digest of the received message using the private key of the sender’s certification authority
Explanation: 

Detailed explanation-1: -The sender uses their private key to generate a signature for the message, which is then sent along with it. Then, the message receiver uses the sender’s public key to verify that the signature is valid and that the message has not been tampered with.

Detailed explanation-2: -The receiver decrypts the digital signature with the public key of the sender, thus regenerating the message digest. The receiver computes a message digest from the message data that was received, and verifies that the two digests are the same. If these digests match, the message is both intact and authentic.

Detailed explanation-3: -The receiver can verify the digital signature with the sender’s public key.

Detailed explanation-4: -Digital signatures work by proving that a digital message or document was not modified-intentionally or unintentionally-from the time it was signed. Digital signatures do this by generating a unique hash of the message or document and encrypting it using the sender’s private key.

Detailed explanation-5: -A digital signature attached to an email message offers another layer of security by providing assurance to the recipient that you-not an imposter-signed the contents of the email message. Your digital signature, which includes your certificate and public key, originates from your digital ID.

There is 1 question to complete.