Need help? We are here

Assume that you generate an authenticated and encrypted message by first applying the RSA transformation determined by your private key and then enciphering the message using the recipients public key.  Explain why this methodology will or will not make it possible to recognize the original message at the recipient’s site.

1 page