NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shared secret key
|
|
User’s private key
|
|
Session key
|
|
Transient key
|
Detailed explanation-1: -The digital signature process begins with creating a cryptographic hash of the message. This hash value is also known as a “digital fingerprint” and is a unique value. The digital fingerprint is then encrypted with the sender’s private key, and the resulting value is appended to the message.
Detailed explanation-2: -The digital signature is basically a one-way hash (or message digest) of the original data that was encrypted with the signer’s private key. To validate the data’s integrity, the recipient first uses the signer’s public key to decrypt the digital signature.
Detailed explanation-3: -A message is hashed using an algorithm such as SHA-1. The hash is then signed (by encrypting the hash with the RSA private key). The message and signed hash are then sent together to the recipient. The recipient can verify the signature by decrypting the encrypted hash using the RSA public key of the sender.