If a digital signature is used to achieve both data-integrity checking and verification of sender, digital
signatures are only used when implementing:
A.
A symmetric-encryption algorithm
B.
CBL-DES
C.
Triple DES
D.
An asymmetric-encryption algorithm