121k views
18 votes
Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob. No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key. Therefore the entire encrypted message serves as a

User Luigino
by
4.7k points

1 Answer

9 votes

Answer:

The answer is "Digital signatures".

Step-by-step explanation:

The digital signatures are also recognized as asymmetric authentication, which is based on popular data cryptography. It generates the individual virtual wrist, which identifies consumers and protects information into digital communications or files. The digital certificate algorithms like RSA can generate two keys, one is the person or one public, that can be connected numerically.

User Neelam Sharma
by
4.6k points