Computer Science, asked by sahupiyush7068, 2 months ago

In cryptography,

1.The receiver can verify signature using public key

2.cryptographic hash function is used in creating digital fingerprint

3.Both 1 and 2

4.None of the above

with reason ​

Answers

Answered by amitnrw
3

Both 1 and 2

A digital signature for verification the authenticity of digital messages / documents

Digital signatures use asymmetric cryptography.

It Works on Public and private key

The receiver can verify signature using public key

Receiver decrypts the digital signature using the public key of sender.

1.The receiver can verify signature using public key - TRUE

Hash functions are known as  fingerprint functions sometimes.

Hash functions can be used to create a unique fingerprint of a digital file.

2 .cryptographic hash function is used in creating digital fingerprint - True

Hence Both 1 & 2 are CORRECT options.

Learn More:

Which of the following statement is true for RSA algorithm ?

https://brainly.in/question/34972188

https://brainly.in/question/34971764

cryptography,

https://brainly.in/question/34972611

Similar questions