NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
i and ii
|
|
ii and iii
|
|
i and iii
|
|
iii and iv
|
Detailed explanation-1: -The sender’s private key is used to encrypt the hash value, creating the digital signature. The original file and the digital signature are sent together to the recipient. The recipient uses the sender’s public key to decrypt the digital signature’s hash.
Detailed explanation-2: -The CA does this by validating (through various processes), the identity of the owner of the public key. Once it has done this it will bind the public key to a digital certificate and sign it using its private key to attest authenticity.
Detailed explanation-3: -A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to authenticate content sent from web servers, ensuring trust in content delivered online.