In public key encryption, "signing" is the act of ________.

adding the password to the challenge message and hashing the two

hashing the plain text message

encrypting the message digest with its own private key

encrypting the message digest with its own public key


encrypting the message digest with its own private key

Computer Science & Information Technology

You might also like to view...

Because of its purpose, the ____ stage is the appropriate place for cybersecurity professionals to be involved in software assurance.

A. review B. specification C. design D. testing

Computer Science & Information Technology

When you are ready to print a document, click the Home tab

Indicate whether the statement is true or false

Computer Science & Information Technology

The name or the location of the active cell is displayed in the Name box

Indicate whether the statement is true or false

Computer Science & Information Technology

In an entity relationship diagram, ________ entities are drawn in a normal rectangle

Fill in the blank(s) with correct word

Computer Science & Information Technology