Susan is trying to find a solution that will verify emails come from the source claimed. Which of the following solutions is most likely to accomplish this?
A.
Any hashing
B.
AES encryption
C.
SHA hashing
D.
Digital signatures
Explanation:
Digital signatures encrypt with tine senders private key, then anyone with the public key can decrypt and verify the sender.