List of questions
Related questions
Question 460 - 312-50v12 discussion
Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?
A.
Alice's private key
B.
Alice's public key
C.
His own private key
D.
His own public key
Your answer:
0 comments
Sorted by
Leave a comment first