InterviewSolution
 Saved Bookmarks
    				| 1. | 
                                    Using public key cryptography, X adds a digital signature σ to a message M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations?(A) Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key.(B) Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key(C) Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.(D) Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key. | 
                            
| Answer» | |