ExamGecko
Question list
Search
Search

Related questions











Question 79 - 212-81 discussion

Report
Export

John is going to use RSA to encrypt a message to Joan. What key should he use?

A.
A random key
Answers
A.
A random key
B.
Joan's public key
Answers
B.
Joan's public key
C.
A shared key
Answers
C.
A shared key
D.
Joan's private key
Answers
D.
Joan's private key
Suggested answer: B

Explanation:

Joan's public key

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

Suppose Joahn uses Bob's public key to send him an encrypted message. In the message, she can claim to be Alice but Bob has no way of verifying that the message was actually from Alice since anyone can use Bob's public key to send him encrypted messages. In order to verify the origin of a message, RSA can also be used to sign a message.

Suppose Alice wishes to send a signed message to Bob. She can use her own private key to do so. She produces a hash value of the message, raises it to the power of d (modulo n) (as she does when decrypting a message), and attaches it as a 'signature' to the message. When Bob receives the signed message, he uses the same hash algorithm in conjunction with Alice's public key. He raises the signature to the power of e (modulo n) (as he does when encrypting a message), and compares the resulting hash value with the message's actual hash value. If the two agree, he knows that the author of the message was in possession of Alice's private key, and that the message has not been tampered with since.

asked 18/09/2024
sheldan simeina
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first