ExamGecko
Question list
Search
Search

Related questions











Question 10 - 212-81 discussion

Report
Export

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

A.
Alice's private key
Answers
A.
Alice's private key
B.
Bob's private key
Answers
B.
Bob's private key
C.
Alice's public key
Answers
C.
Alice's public key
D.
Bob's public key
Answers
D.
Bob's public key
Suggested answer: C

Explanation:

Alice's public key

https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own --- just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

asked 18/09/2024
Rodrigo Serrano dos Santos
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first