COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
To verify a digital signature we need the
A
Sender’s Private key
B
Sender’s Public key
C
Receiver’s Private key
D
Receiver’s Public key
Explanation: 

Detailed explanation-1: -Digital signatures work through public key cryptography’s two mutually authenticating cryptographic keys. For encryption and decryption, the person who creates the digital signature uses a private key to encrypt signature-related data. The only way to decrypt that data is with the signer’s public key.

Detailed explanation-2: -A digital certificate is an electronic document issued by a Certificate Authority (CA). It contains the public key for a digital signature and specifies the identity associated with the key, such as the name of an organization. The certificate is used to confirm that the public key belongs to the specific organization.

Detailed explanation-3: -Decrypts the signature (2) with the public key to obtain a message, supposedly the same message as (1) but we don’t know yet. Encrypt the original message (1) with the public key to obtain a hash. Encrypt the decrypted message (3) to get a second hash and compare to (4) to verify that they are identical. 15-Aug-2013

There is 1 question to complete.