your computer system is a participant in an asymmetric cryptography system. you've created a message to send to another user. before transmission, you hash the message and encrypt the hash using your private key. you then attach this encrypted hash to your message as a digital signature before sending it to the other user. in this example, which protection does the hashing activity provide? answer confidentiality availability integrity non-repudiation

Respuesta :

Integrity, The resource can't be seen or accessed by unauthorized persons.

Which encryption only works if both the sender and the recipient involved in the communication keep the key secret?

The most common type of key is symmetric, which uses the same key for both encrypting and decrypting the ciphertext. Because you have to keep it a secret, this kind of key is known as a secret key. Otherwise, messages that have been encrypted with the key can be decrypted by anyone who has it.

How can cryptography be used to safeguard the integrity and confidentiality of data?

Data integrity is guaranteed by cryptography employing message digests and hashing methods. The receiver is ensured that the data received has not been tampered with by supplying codes and digital keys to confirm that what is received is legitimate and from the intended sender.

to know more about asymmetric cryptography here:

brainly.com/question/25528976

#SPJ4

ACCESS MORE
ACCESS MORE
ACCESS MORE
ACCESS MORE