ExamGecko
Question list
Search
Search

Related questions











Question 24 - 212-81 discussion

Report
Export

Terrance oversees the key escrow server for his company. All employees use asymmetric cryptography to encrypt all emails. How many keys are needed for asymmetric cryptography?

A.
2
Answers
A.
2
B.
4
Answers
B.
4
C.
3
Answers
C.
3
D.
1
Answers
D.
1
Suggested answer: A

Explanation:

:

2

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.

asked 18/09/2024
Mahendra Belgaonkar
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first