When the RSA algorithm is used for signing a message from Alice to Bob, which statement best
describes that operation?
A.
Alice signs the message with her private key, and Bob verifies that signature with Alice’s public
key.
B.
Alice signs the message with her public key, and Bob verifies that signature with Alice’s private
key.
C.
Alice signs the message with Bob’s private key, and Bob verifies that signature with his public
key.
D.
Alice signs the message with Bob’s public key, and Bob verifies that signature with his private
key.
E.
Alice signs the message with her public key, and Bob verifies that signature with his private key.
F.
Alice signs the message with her private key, and Bob verifies that signature with his public key.
Explanation: