If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:
A.
A symmetric encryption algorithm.
B.
CBL-DES.
C.
ESP.
D.
An asymmetric encryption algorithm.
E.
Triple DES.
Correct answer is