Computer Science, asked by gagandeepjadhav4608, 10 months ago

The authentication to be affected by the use of asymmetric crypto system and has function is known as

Answers

Answered by Anonymous
12

Answer:

The typical application for asymmetric cryptography is authenticating data through the use of digital signatures. ... Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash.

Similar questions