Answer digital signatures question. assume Alice has the RSA key(eA, dA, nA) and Bob has the RSA key(eB, dB, nB), where eA, eB, nA,and nB are public, dA is known only to Alice, and dB is known onlyto Bob.
(a) Describe how Alice could use her RSA key to sign a publicmessage m, and explain why this approach satisfies the objective ofnon repudiation.
(b) Describe how Alice could encrypt and send a secret messageto Bob in such a way that only he could read it, and he would beconvinced the message came from Alice.