FUNDAMENTALS OF COMPUTER

OPERATING SYSTEMS FOR COMPUTERS

COMPUTER OPERATING SYSTEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How does PKI work?
A
Server public key (Asymmetric key) sent to clientClient uses its private key to encrypt webpage key (asymmetric Key)Cipher text sent to serverServer decrypts with public key (symmetric). Server now has safe webpage.
B
Client and server agree on a key (Symmetric Key)Key sent so both have copyClient encrypts website with credentials and sends cipher to Server (symmetric key)Server now decrypts with given shared private key (symmetric)Server can encrypt anything with the same private (symmetric) key and send back to the client
C
Server public key (Asymmetric key) sent to clientClient uses the given key to encrypt session key (symmetric Key)Cipher text sent to serverServer decrypts with private key (asymmetric key). Both now have session key to communicate safely, and quickly.
D
None of the above
Explanation: 

Detailed explanation-1: -Public key infrastructure uses asymmetric encryption methods to ensure that messages remain private and also to authenticate the device or user sending the transmission. Asymmetric encryption involves the use of a public and private key. A cryptographic key is a long string of bits used to encrypt data.

Detailed explanation-2: -Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

Detailed explanation-3: -In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA).

Detailed explanation-4: -Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.

There is 1 question to complete.