ExamGecko
Question list
Search
Search

Related questions











Question 305 - 312-50v12 discussion

Report
Export

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

A.
Use his own public key to encrypt the message.
Answers
A.
Use his own public key to encrypt the message.
B.
Use Marie's public key to encrypt the message.
Answers
B.
Use Marie's public key to encrypt the message.
C.
Use his own private key to encrypt the message.
Answers
C.
Use his own private key to encrypt the message.
D.
Use Marie's private key to encrypt the message.
Answers
D.
Use Marie's private key to encrypt the message.
Suggested answer: B

Explanation:

When a user encrypts plaintext with PGP, PGP first compresses the plaintext. The session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient's public key https://en.wikipedia.org/wiki/Pretty_Good_Privacy Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a username or an e-mail address.

https://en.wikipedia.org/wiki/Public-key_cryptography

Public key encryption uses two different keys. One key is used to encrypt the information and the other is used to decrypt the information. Sometimes this is referred to as asymmetric encryption because two keys are required to make the system and/or process work securely. One key is known as the public key and should be shared by the owner with anyone who will be securely communicating with the key owner. However, the owner's secret key is not to be shared and considered a private key. If the private key is shared with unauthorized recipients, the encryption mechanisms protecting the information must be considered compromised.

asked 18/09/2024
Glen Makhuvele
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first