Computer Science, asked by gagandeepjadhav4608, 1 year ago

The authentication to be affected by the use of asymmetric crypto system and has function is known as

Answers

Answered by Anonymous
12

Answer:

The typical application for asymmetric cryptography is authenticating data through the use of digital signatures. ... Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash.

Similar questions