The Rivest, Shamir, and Adleman (RSA) algorithm can be used to create digital signatures for authentication. Suppose Alice wants to sign a message using RSA and send it to Bob. Which one of the following statements most accurately describes this operation?
A.
Alice creates a hash of her messages, and then encrypts this hash with her public key to create the signature to be sent along with the message to Bob
B.
Alice creates a hash of her message, and then encrypts this hash with her private key to create the signature to be sent along with the message to Bob
C.
Alice creates a hash based on her message combined with her public key, and then uses this hash to create the signature to be sent along with the message to Bob
D.
Alice creates a hash based on her message combined with her private key, and then uses this hash to create the signature to be sent along with the message to Bob
E.
Alice encrypts her message with her public key, creates a signature by hashing this encrypted message. Then sends it along with the message to Bob