A security architect is designing a secure document exchange system. A primary requirement is to provide non-repudiation and data integrity, ensuring the recipient can verify the sender's identity and that the document has not been tampered with. Which of the following cryptographic mechanisms would BEST fulfill this specific requirement?
Generating a Message Authentication Code (MAC) using a shared secret key.
Establishing a Transport Layer Security (TLS) tunnel for data transmission.
Encrypting the document's hash with the sender's private key.
Encrypting the entire document with the recipient's public key.
The correct answer is Encrypting the document's hash with the sender's private key. This process creates a digital signature. It ensures integrity because any change to the document will result in a different hash. It provides authentication and non-repudiation because only the holder of the unique private key could have encrypted the hash, and they cannot later deny signing it.
Encrypting the entire document with the recipient's public key is incorrect. This action provides confidentiality, ensuring only the intended recipient can decrypt and read the document, but it does not provide integrity or non-repudiation for the sender.
Generating a Message Authentication Code (MAC) using a shared secret key is incorrect. A MAC provides integrity and authentication, but because it relies on a key shared between the sender and receiver, it cannot provide non-repudiation. Either party could have generated the MAC, so the sender could deny having sent the message.
Establishing a Transport Layer Security (TLS) tunnel for data transmission is incorrect. TLS secures the communication channel, protecting data from eavesdropping and tampering while in transit. However, it does not provide a persistent signature on the document itself that can be verified later for non-repudiation. The protection ends once the TLS session is terminated.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the private key ensure the authenticity of a digital signature?
Open an interactive chat with Bash
What is the difference between a digital signature and encryption?
Open an interactive chat with Bash
How does a digital signature provide message integrity?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .