Your application accepts documents from unknown third parties over an encrypted connection.
The documents are accompanied by a digital signature that attests to the origin of the document.
Which aspect of the system limits the degree of confidence you can have in the origin of any given
document if the implementation of all software is flawless?
A.
The strength of the signature algorithm
B.
The number of bits used in the signature
C.
The strength of encryption used to hide the conversation
D.
The certification practices associated with the certificate