Computer Science, asked by tripathivaibhav733, 5 months ago

Q:2. In cryptography,
1.The receiver can verify signature using public key
2.cryptographic hash function is used in creating digital fingerprint
3.Both 1 and 2
4.None of the above​

Answers

Answered by amitnrw
1

Both 1 and 2

A digital signature for verification the authenticity of digital messages / documents

Digital signatures use asymmetric cryptography.

It Works on Public and private key

The receiver can verify signature using public key

Receiver decrypts the digital signature using the public key of sender.

1.The receiver can verify signature using public key - TRUE

Hash functions are known as  fingerprint functions sometimes.

Hash functions can be used to create a unique fingerprint of a digital file.

2 .cryptographic hash function is used in creating digital fingerprint - True

Hence Both 1 & 2 are CORRECT options.

Learn More:

Which of the following statement is true for RSA algorithm ?

https://brainly.in/question/34972188

https://brainly.in/question/34971764

cryptography,

https://brainly.in/question/34971777

Similar questions