Computer Science, asked by ganeshkipm9621gaur18, 4 months ago

In cryptography,

1. The receiver can verify signature using public key
2.0 cryptographic hash function is used in creating digital fingerprint

3.0 Both 1 and 2

4.0 None of the above

Answers

Answered by petertru000
0

Answer:

yes

Explanation:

Similar questions