hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is True?
    Question



    A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is True?

    A.

    Sender encrypts using receiver’s public key

    B.

    Sender encrypts using his own public key

    C.

    Receiver decrypts using sender’s public key

    D.

    Receiver decrypts using his own public key

    Correct option is A


    In public key cryptography, the encryption and decryption process works as follows:
    1. Encryption: The sender encrypts the message using the receiver’s public key. This ensures that only the receiver, who has the corresponding private key, can decrypt it.
    2. Decryption: The receiver uses their private key to decrypt the message. Since the private key is kept confidential, only the intended receiver can access the message.
    Why the sender uses the receiver’s public key?
    Public key cryptography ensures confidentiality. By encrypting the message with the receiver's public key, only the receiver can decrypt it, maintaining secure communication.
    Information Booster
    1. Key Components in Public Key Cryptography:
    · Public Key: Shared openly and used for encryption.
    · Private Key: Kept secret and used for decryption.
    2. Security Provided:
    · Ensures confidentiality since only the intended receiver can decrypt the message.
    · Prevents unauthorized access even if the message is intercepted.
    3. Real-World Applications:
    · Secure email communication.
    · Digital signatures.
    · HTTPS for secure web browsing.
    4. Encryption vs. Digital Signature:
    · Encryption ensures confidentiality.
    · Digital signatures verify authenticity and integrity.
    Additional Knowledge
    · The sender does not use their own public key for encryption (Option b is wrong).
    · Decryption always uses the receiver’s private key, not the sender’s public key (Options c and d are wrong).
    · Public key cryptography algorithms include RSA, ECC and ElGamal.

    test-prime-package

    Access ‘UGC NET Computer Science’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    175k+ students have already unlocked exclusive benefits with Test Prime!

    Free Tests

    Free
    Must Attempt

    UGC NET Paper-I (21 August 2024 Shift 2)

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper-I (21 August 2024 Shift 2)

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper-I (21 August 2024 Shift 2)

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English