The goal of an information system is to achieve integrity, authenticity and non-repudiation of information’s sent across the network. Which of the following statement correctly describe the steps to address all three?
A. Encrypt the message digest using symmetric key and then send the encrypted digest to receiver along with original message
B. Encrypt the message digest using receiver's public key and then send the encrypted digest to receiver along with original message
C. Encrypt the message digest using sender's public key and then send the encrypted digest to the receiver along with original message
D. Encrypt message digest using sender's private key and then send the encrypted digest to the receiver along with original message