Correct option is B
In
asymmetric key cryptography, there are two keys: a
public key and a
private key. The
public key is shared openly, while the
private key is kept confidential by the intended recipient. The sender
encrypts the message using the recipient’s public key, and only the recipient can
decrypt it using their private key.
Thus, the
private key is always kept by the receiver to ensure secure decryption and prevent unauthorized access.
Important Key Points:
1.
Asymmetric Encryption: This cryptographic method uses two keys – a public key for encryption and a private key for decryption.
2.
Role of the Receiver: The receiver holds the
private key, which allows them to decrypt messages encrypted with the corresponding public key.
3.
Public Key Distribution: The sender and anyone else can access the
public key, but only the receiver has the private key.
4.
Security Advantage: Asymmetric cryptography ensures that even if the public key is compromised, the private key remains secret, maintaining security.
5.
Common Algorithms: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography), and Diffie-Hellman are examples of asymmetric encryption methods.
6.
Applications: Asymmetric cryptography is widely used in
digital signatures, secure email communication, SSL/TLS protocols and blockchain technology.
Knowledge Booster:
·
Sender: The sender uses the
receiver’s public key for encryption but does not need the private key for communication.
·
Sender and Receiver: Both do not share the same private key in asymmetric cryptography. Only the receiver possesses it.