Computer Science for IGCSE & O level - Data Transmission (Section 5 - No. 34)
When using asymmetric encryption, how is the sender's private key typically used?
To encrypt the message that is sent.
To decrypt the message that is sent.
To create a digital signature.
To verify the receiver's public key.
Explanation
The sender's private key is used to create a digital signature, which provides authentication and non-repudiation. The receiver then uses the sender's public key to verify the signature.
Comments (0)
