Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography.
What key does Bob use to encrypt the checksum for accomplishing this goal?
A. Alice's public key
B. His own public key
C. His own private key
D. Alice's private key
What key does Bob use to encrypt the checksum for accomplishing this goal?
A. Alice's public key
B. His own public key
C. His own private key
D. Alice's private key