Question:Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH? 

A The hash is a nearly unique digest of the message 

B The hash is encrypted using the public key of the sender 

C The encrypted hash serves as a signature of the sender and is sent separately from the decrypted message 

D The hash is the opposite of the usual process used in encryption, in which the public key is used to encrypt, and the plain text is not sent 

+ Answer
+ Report
Total Preview: 1146

Copyright © 2024. Powered by Intellect Software Ltd