If a digital signature is used to achieve both data-integrity checking and verification of
sender, digital signatures are only used when implementing:
A.
A symmetric-encryption algorithm
B.
CBL-DES
C.
Triple DES
D.
An asymmetric-encryption algorithm
If a digital signature is used to achieve both data-integrity checking and verification of
sender, digital signatures are only used when implementing:
If a digital signature is used to achieve both data-integrity checking and verification of
sender, digital signatures are only used when implementing:
A.
A symmetric-encryption algorithm
B.
CBL-DES
C.
Triple DES
D.
An asymmetric-encryption algorithm