COMPUTER FUNDAMENTALS

COMPUTER APPLICATIONS

E COMMERCE AND E BUSINESS APPLICATIONS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it. This refer to
A
symmetric encryption
B
private key encryption
C
asymmetric encryption
D
single encryption
Explanation: 

Detailed explanation-1: -The two keys are called the “public key” and the “private key” of the user. The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message. Asymmetric encryption is also called public-key encryption, but it actually relies on a key pair.

Detailed explanation-2: -Only the holder of the private key can encrypt information that can be decrypted with the public key. Any party can use the public key to read the encrypted information; however, data that can be decrypted with the public key is guaranteed to originate with the holder of the private key.

Detailed explanation-3: -Public key encryption One key is nominated as the private key and is kept secret. The other key is distributed to anyone who wants it; this key is the public key. Anyone can encrypt a message by using your public key, but only you can read it. When you receive the message, you decrypt it by using your private key.

Detailed explanation-4: -Asymmetric encryption algorithms use two different keys for encryption and decryption. The key used for encryption is the public key, and the key used for decryption is the private key. Both the keys must belong to the receiver.

There is 1 question to complete.