SlideShare a Scribd company logo
1 of 1
Download to read offline
Which asymmetric cryptosystem is used for digital signatures?
A. DES
B. SHA1
C. Diffie-Hellman
D. ECC
Solution
D. Elliptic curve cryptosystems (ECC) is an asymmetric cryptosystem created in the 1980s to
create and store digital signatures in a small amount of memory. Answer A is incorrect because
DES is a symmetric algorithm. Answer B is incorrect because SHA1 is a hashing algorithm.
Answer C is incorrect because Diffie-Hellman is used for key exchange.

More Related Content

More from optokunal1

This is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdfThis is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdf
optokunal1
 
The concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdfThe concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdf
optokunal1
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
optokunal1
 
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdfProblem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
optokunal1
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
optokunal1
 
import java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdfimport java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdf
optokunal1
 
From Chapter 2 - Identify and describe the critical functions of com.pdf
From Chapter 2 - Identify and describe the critical functions of com.pdfFrom Chapter 2 - Identify and describe the critical functions of com.pdf
From Chapter 2 - Identify and describe the critical functions of com.pdf
optokunal1
 

More from optokunal1 (20)

Verify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdfVerify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdf
 
Use C++class Node{public   Node ( int = 0 );       constru.pdf
Use C++class Node{public   Node ( int = 0 );        constru.pdfUse C++class Node{public   Node ( int = 0 );        constru.pdf
Use C++class Node{public   Node ( int = 0 );       constru.pdf
 
This is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdfThis is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdf
 
The concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdfThe concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdf
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
 
Proteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdfProteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdf
 
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdfProblem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
Mosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdfMosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdf
 
Many programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdfMany programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdf
 
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdf
Inferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdfInferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdf
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdf
 
import java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdfimport java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdf
 
I need this in python. Only python, please. Use list methods to add .pdf
I need this in python. Only python, please. Use list methods to add .pdfI need this in python. Only python, please. Use list methods to add .pdf
I need this in python. Only python, please. Use list methods to add .pdf
 
How many defective copies of a gene must someone inherit to express .pdf
How many defective copies of a gene must someone inherit to express .pdfHow many defective copies of a gene must someone inherit to express .pdf
How many defective copies of a gene must someone inherit to express .pdf
 
From Chapter 2 - Identify and describe the critical functions of com.pdf
From Chapter 2 - Identify and describe the critical functions of com.pdfFrom Chapter 2 - Identify and describe the critical functions of com.pdf
From Chapter 2 - Identify and describe the critical functions of com.pdf
 
For this activity, hover over the various management viewpoints for h.pdf
For this activity, hover over the various management viewpoints for h.pdfFor this activity, hover over the various management viewpoints for h.pdf
For this activity, hover over the various management viewpoints for h.pdf
 
Explain the goal of interim reporting and how the interim period is .pdf
Explain the goal of interim reporting and how the interim period is .pdfExplain the goal of interim reporting and how the interim period is .pdf
Explain the goal of interim reporting and how the interim period is .pdf
 
Describe various scales of measurements. Provide two examples of .pdf
Describe various scales of measurements. Provide two examples of .pdfDescribe various scales of measurements. Provide two examples of .pdf
Describe various scales of measurements. Provide two examples of .pdf
 
Discrete random variables X(u) and F(u) both take values in {-1,0,+1}.pdf
Discrete random variables X(u) and F(u) both take values in {-1,0,+1}.pdfDiscrete random variables X(u) and F(u) both take values in {-1,0,+1}.pdf
Discrete random variables X(u) and F(u) both take values in {-1,0,+1}.pdf
 
All of these are steps in the lytic cycle of a temperate bacteriopha.pdf
All of these are steps in the lytic cycle of a temperate bacteriopha.pdfAll of these are steps in the lytic cycle of a temperate bacteriopha.pdf
All of these are steps in the lytic cycle of a temperate bacteriopha.pdf
 

Recently uploaded

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Which asymmetric cryptosystem is used for digital signaturesA. DE.pdf

  • 1. Which asymmetric cryptosystem is used for digital signatures? A. DES B. SHA1 C. Diffie-Hellman D. ECC Solution D. Elliptic curve cryptosystems (ECC) is an asymmetric cryptosystem created in the 1980s to create and store digital signatures in a small amount of memory. Answer A is incorrect because DES is a symmetric algorithm. Answer B is incorrect because SHA1 is a hashing algorithm. Answer C is incorrect because Diffie-Hellman is used for key exchange.