Question:Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH?
A The hash is a nearly unique digest of the message
B The hash is encrypted using the public key of the sender
C The encrypted hash serves as a signature of the sender and is sent separately from the decrypted message
D The hash is the opposite of the usual process used in encryption, in which the public key is used to encrypt, and the plain text is not sent
+ AnswerA
+ Report