A digital signature is created by the sender to prove message integrity by :
A. encrypting the message with the sender's private key. Upon receiving the data, the recipient can
decrypt the data using the sender's public key.
B. encrypting the message with the recipient's public key. Upon receiving the data, the recipient can
decrypt the data using the recipient's public key.
C. initially using a hashing algorithm to produce a hash value or message digest from the entire
message contents. Upon receiving the data, the recipient can independently create it.
D.encrypting the message with the sender's public key. Upon receiving the data, the recipient can
decrypt the data using the recipient's private key.