If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:

If a digital signature is used to achieve both data-integrity checking and verification of sender, digital
signatures are only used when implementing:

If a digital signature is used to achieve both data-integrity checking and verification of sender, digital
signatures are only used when implementing:

A.
A symmetric-encryption algorithm

B.
CBL-DES

C.
Triple DES

D.
An asymmetric-encryption algorithm



Leave a Reply 0

Your email address will not be published. Required fields are marked *