John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered

Respuesta :

Asymmetric cryptography is often regarded as Public-key cryptography. It often uses pairs of keys. The process that Alex should use along with asymmetric cryptography so that John can be sure that the received document is real is Digital signature algorithm.

  • In asymmetric cryptography, the both pair has a public key and a private key.

The Digital Signature Algorithm is simply known to be a Federal Information Processing Standard for digital signatures.

DSA as it is often called is gotten from the Schnorr and ElGamal signature schemes.

It often used for digital signature and its verification and thus shows authenticity.

Learn more from

https://brainly.com/question/13567401

Ver imagen Martebi