CompTIA Security+ Question K-71

Ann wants to send a file to Peter using PKI. Which of the following should Ann use in order to sign the file?

A. Peter’s public key
B. Peter’s private key
C. Ann’s public key
D. Ann’s private key

Answer: D

The sender uses his private key, in this case Ann’s private key, to create a digital signature. The message is, in effect, signed with the private key. The sender then sends the message to the receiver. The receiver uses the public key attached to the message to validate the digital signature. If the values match, the receiver knows the message is authentic. The receiver uses a key provided by the sender—the public key—to decrypt the message. Most digital signature implementations also use a hash to verify that the message has not been altered, intentionally or accidently, in transit.