Correct option is A
In public key cryptography, the encryption and decryption process works as follows:
1.
Encryption: The sender encrypts the message using the
receiver’s public key. This ensures that only the receiver, who has the corresponding
private key, can decrypt it.
2.
Decryption: The receiver uses their
private key to decrypt the message. Since the private key is kept confidential, only the intended receiver can access the message.
Why the sender uses the receiver’s public key?
Public key cryptography ensures confidentiality. By encrypting the message with the receiver's public key, only the receiver can decrypt it, maintaining secure communication.
Information Booster
1.
Key Components in Public Key Cryptography:
·
Public Key: Shared openly and used for encryption.
·
Private Key: Kept secret and used for decryption.
2.
Security Provided:
· Ensures
confidentiality since only the intended receiver can decrypt the message.
· Prevents unauthorized access even if the message is intercepted.
3.
Real-World Applications:
· Secure email communication.
· Digital signatures.
· HTTPS for secure web browsing.
4.
Encryption vs. Digital Signature:
· Encryption ensures confidentiality.
· Digital signatures verify authenticity and integrity.
Additional Knowledge
· The sender
does not use their own public key for encryption (Option b is wrong).
· Decryption always uses the
receiver’s private key, not the sender’s public key (Options c and d are wrong).
· Public key cryptography algorithms include
RSA,
ECC and
ElGamal.