COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Non-repudiation
|
|
Hashing
|
|
Transport encryption
|
|
Key escrow
|
Detailed explanation-1: -Digital signatures use asymmetric cryptography to achieve the goals of integrity, authentication and non-repudiation.
Detailed explanation-2: -The digital signature confirms the integrity of the message. This signature ensures that the information originated from the signer and was not altered, which proves the identity of the organization that created the digital signature. Any change made to the signed data invalidates the whole signature.
Detailed explanation-3: -The Online Certificate Status Protocol (OCSP) and the certificate revocation list (CRL) are used to verify the status of digital certificates.
Detailed explanation-4: -A digital signature is a cryptographic output used to verify the authenticity of data. A digital signature algorithm allows for two distinct operations: a signing operation, which uses a signing key to produce a signature over raw data.