ExamGecko
Question list
Search
Search

Related questions











Question 326 - 312-50v12 discussion

Report
Export

Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

A.
Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
Answers
A.
Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
B.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Answers
B.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
C.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Answers
C.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
D.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
Answers
D.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
Suggested answer: C

Explanation:

https://blog.mailfence.com/how-do-digital-signatures-work/

https://en.wikipedia.org/wiki/Digital_signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications.

Digital signatures can provide evidence of origin, identity, and status of electronic documents, transactions, or digital messages. Signers can also use them to acknowledge informed consent.

Digital signatures are based on public-key cryptography, also known as asymmetric cryptography.

Two keys are generated using a public key algorithm, such as RSA (Rivest-Shamir-Adleman), creating a mathematically linked pair of keys, one private and one public.

Digital signatures work through public-key cryptography's two mutually authenticating cryptographic keys. The individual who creates the digital signature uses a private key to encrypt signature-related data, while the only way to decrypt that data is with the signer's public key.

asked 18/09/2024
DANIEL DOYEN
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first