. The checksum function cannot be used as a cryptographic hash function. II. In asymmetric key cryptography, the sender announces the private key publicly. (a) Only I is correct (b) Only II is correct (c) Both I and II are correct (d) Neither I nor II are correct
Answers
Answered by
0
Answer:
An appropriate answer to the question would be option (a) which is I is correct since the checksum function is a very integral function and it mainly works on the principle or algorithm of cryptographic hash function.
The other option is not correct to the given question so as a result only option I is the correct answer of the question.
Similar questions