CISSP Practice Question – Cryptography
An organization wants to implement digital signatures to ensure integrity and non-repudiation of sensitive documents exchanged between business partners. Which of the following BEST describes how a digital signature is created? A. The sender encrypts the message with their private key, and the recipient decrypts it with the sender’s public key. B. The sender hashes the message and encrypts the hash with their private key; the recipient verifies it with the sender’s public key. C. The sender encrypts the message with the recipient’s public key, and the recipient decrypts it with their private key. D. The sender hashes the message and encrypts the hash with the recipient’s public key; the recipient decrypts it with their private key.