1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
13

Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.

Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. Which protection does the private key-signing activity of this process provide
Computers and Technology
1 answer:
Anna [14]3 years ago
5 0

Answer: integrity

Explanation:

Hashing refers to changing a string of characters into shorter fixed-length value which represents the original string. Hashing is faster to find items in the database.

Based on the information given, the protection that he private key-signing activity of this process provide us integrity.

You might be interested in
What is the term for the action of Brazil imposing tariffs on US imports in response to the imposed tariffs by the U.S. on Brazi
TEA [102]

I think the answer is B.

3 0
3 years ago
Who prime minister of india​
Alex777 [14]
<h3>\mathfrak\red{✨ Answer :-}</h3>

Mr. Narendra modi is a prime Minister of Indian.

8 0
3 years ago
Read 2 more answers
Does anyone know? If you do please answer.
Sidana [21]
Whats the question..
6 0
3 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
Enter the name of your school or work URL and generate report.What score did it receive?
natta225 [31]

Answer:

Harold Washington College. 21.1

4 0
3 years ago
Other questions:
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • If you find yourself in a position where you need to restore an object or container within active directory that has been inadve
    6·1 answer
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • Weak Induction
    8·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • A signal causes the operating system to stop and assess what to do next.( Identify the name of this signal.)​
    5·1 answer
  • If you need any answer answered faster check out Wolframalpha.com
    14·2 answers
  • The ______________<br> holds data only while the computer is on.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!