This topic contains 1 reply, has 2 voices, and was last updated by  Pankaj 3 months ago.

  • Author
    Posts
  • #607903 Reply
     EduGorilla 
    Keymaster
    Select Question Language :


    The authentication to be affected by use of asymmetric crypto system and hash function is known as

    Options :-

    1. public key
    2. private key
    3. digital signature
    4. None of the above
    Post your Training /Course Enquiry
    Are You looking institutes / coaching center for
    • IIT-JEE, NEET, CAT
    • Bank PO, SSC, Railways
    • Study Abroad
    Select your Training / Study category
  • #2174055 Reply
     Pankaj
    Select Question Language :


    give ans

Reply To: The authentication to be affected by use of asymmetric crypto system and hash function is known as….
Your information:




Verify Yourself




Log in with your credentials

or    

Forgot your details?

Create Account