Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?
It should be Bob's own Private key. Because, Then only anyone or the intended receiver can decrypt the checksum and verify. It also makes sure the sender is Bob, as the key involved is Private key of Bob which can be only used by him.
Public key of Alice can be also used by an attacker encrypt the falsified checksum.
upvoted 1 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Anojithan
3 years ago