Which of the following will MOST likely compromise the control provided by a digital signature created using RSA encryption?
A. Deciphering the receiver's public key
B. Obtaining the sender's private key
C. Altering the plaintext message
D. Reversing the hash function using the digest
A. Deciphering the receiver's public key
B. Obtaining the sender's private key
C. Altering the plaintext message
D. Reversing the hash function using the digest