Live Virtual Machine Lab 4-1: Cryptographic Solutions
Which files does Alice send to Bob so her digital signature can be verified? [Choose all that apply]
Alice's Prublic Key Alice's Signature File Alice's Digest
What process is completed after a Certificate Authority (CA) receives a Certificate Signing Request (CSR) and before they sign the requestor's certificate?
Domain Validation
Asymmetric encryption requires two keys that are mathematically related. How is this mathematical relationship established?
The public key takes the private key as input during key generation
By default, what format are OpenSSL certificates created in?
PEM
Which cryptographic algorithm is asymmetric?
RSA