Computer Science, asked by TransitionState, 1 year ago

. The checksum function cannot be used as a cryptographic hash function. II. In asymmetric key cryptography, the sender announces the private key publicly. (a) Only I is correct (b) Only II is correct (c) Both I and II are correct (d) Neither I nor II are correct​

Answers

Answered by ronakbhavsar495
0

Answer:

An appropriate answer to the question would be option (a) which is I is correct since the checksum function is a very integral function and it mainly works on the principle or algorithm of cryptographic hash function.

The other option is not correct to the given question so as a result only option I is the correct answer of the question.

Similar questions