COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A hashing function for digital signature(i) must give a hashed message which is shorter than the original message(ii) must be hardware implementable(iii) two different message should not give the same hashed message(iv) is not essential for implementing digital signature
A
i and ii
B
ii and iii
C
i and iii
D
iii and iv
Explanation: 

Detailed explanation-1: -The sender’s private key is used to encrypt the hash value, creating the digital signature. The original file and the digital signature are sent together to the recipient. The recipient uses the sender’s public key to decrypt the digital signature’s hash.

Detailed explanation-2: -The CA does this by validating (through various processes), the identity of the owner of the public key. Once it has done this it will bind the public key to a digital certificate and sign it using its private key to attest authenticity.

Detailed explanation-3: -A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to authenticate content sent from web servers, ensuring trust in content delivered online.

There is 1 question to complete.