edited by
9,330 views
27 votes
27 votes

Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires.

  1. Anarkali's public key.
  2. Salim's public key.
  3. Salim's private key.
  4. Anarkali's private key.
edited by

5 Answers

Best answer
49 votes
49 votes

In digital signature,
Alice/Anarkali/sender :P
First encrypts with own private key then again encrypts with Receivers/Bob/Salim's Public key.

Thus to decrypt, receiver will need sender's/Anarkali's public key after decrypting it with own/receiver's private key.

So, answer is A.

edited by
21 votes
21 votes
Basically it is about the authentication of the signature. How will Salim know that  Anarkali's signature is genuine? So he uses the public key of Anarkali to decrypt the message .If it works, Salim is convinced that Anarkali is the genuine sender who used her private key to encrypt the message.Hence A (ans)
19 votes
19 votes

Answer is : (a)  Anarkali's public key

There is a another concept through which this problem can be solved:

in RSA,                                                                                              

Encryption:Done by Receiver's Public key

Decryption:Done by Receiver's Private key

in Digital signature,                         

Encryption:Done by sender's private key

Decryption:Done by sender's public key

11 votes
11 votes
In digital signature, sender encrypts the message using her private key and receiver decrypts it using sender's public key.
So, option A is apt.
Answer:

Related questions

0 votes
0 votes
1 answer
4
go_editor asked Nov 20, 2020
1,893 views
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$