NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which algorithm algorithm provides the private key and its corresponding public key?
|
Key generation algorithm
|
|
Signature verifying algorithm
|
|
Signing algorithm
|
|
None of the above
|
Explanation:
Detailed explanation-1: -The key generation algorithm selects private key randomly from a set of possible private keys. This algorithm provides the private key and its corresponding public key.
Detailed explanation-2: -A digital signature scheme consists of three algorithms, namely the key generation algorithm, the signing algorithm and the verification algorithm.
Detailed explanation-3: -Hashing can show that data has not changed in transmission, but on its own cannot demonstrate that the data originated with its supposed author. To do that, a digital signature should be used. Digital signatures use the sender’s private key to encrypt the hash.
There is 1 question to complete.