Prev Question
Next Question

To ensure authentication, confidentiality and integrity of a message, the sender should encrypt the
hash of the message with the sender’s:

A.
public key and then encrypt the message with the receiver’s private key.

B.
private key and then encrypt the message with the receiver’s public key.

C.
public key and then encrypt the message with the receiver’s public key.

D.
private key and then encrypt the message with the receiver’s private key.

Explanation:
Obtaining the hash of the message ensures integrity; signing the hash of the message with the
sender’s private key ensures the authenticity of the origin, and encrypting the resulting message
with the receiver’s public key ensures confidentiality. The other choices are incorrect.

Prev Question
Next Question
Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *