This technique uses an asymmetric key pair, where the private key is used to create a unique code. The matching public key confirms both who sent the data and that no changes occurred. The other choices lack the component that guarantees data integrity and proves the origin of the message through a private key signing mechanism. Hash-based approaches can detect changes but do not confirm the sender’s identity. Steganography hides information rather than vouching for authenticity. Symmetric encryption safeguards confidentiality but does not inherently provide a distinct signature tied to an individual’s private key.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a digital signature work?
Open an interactive chat with Bash
What is the difference between symmetric and asymmetric encryption?
Open an interactive chat with Bash
Why can't hash-based approaches confirm the sender’s identity?