Question 1
In digital signatures, what is the role of a private key?
Question 2
During verification, which key does the recipient use to decrypt the digital signature?
Question 3
Which method is primarily used to prove the integrity of a piece of data?
Question 4
What component in the digital signature process ensures integrity and origin verification?
Question 5
What can a hash mismatch during verification indicate?
Question 6
What is a primary benefit of understanding the digital signature process?
Question 7
What is non-repudiation in the context of cryptographic transactions?
Question 8
How is proof of origin achieved in cryptography?
Question 9
What happens to the hash value if any character in the data is changed?
Question 10
What ensures proof of identity in cryptographic communications?
Question 11
Which aspect of the hash indicates that data integrity is maintained?
Question 12
What does a hash value indicate when it remains unchanged?
Question 13
What two types of keys are used in a digital signature process?
Question 14
In the example of Alice and Bob, which action does Bob perform to verify the message?
Question 15
What essential feature does a digital signature provide?