NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Symmetric encryption
|
|
Encrypting hash with the private key of the sender
|
|
Hash
|
|
Encrypting Symmetric key with the public key of receiver
|
Detailed explanation-1: -The public key decryption also verifies the integrity of the signed message and verifies the sender as the source.
Detailed explanation-2: -Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection. The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity and signatory non-repudiation.
Detailed explanation-3: -A valid digital signature enables information integrity (using hash algorithm) to ensure message is not altered, message created by the sender (authentication) and sender cannot deny having sent the message (non-repudiation).
Detailed explanation-4: -In the case of digital signatures, the public key is used to verify a digital signature that was signed using the corresponding private key.
Detailed explanation-5: -Ensure integrity by creating a digital signature of the message using the sender’s private key. Ensure confidentiality by encrypting the entire message with the recipient’s public key. Verify the user’s identity using the public key and checking it against a certificate authority. 01-Feb-2021