COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In asymmetric key cryptography, the private key is kept by ____
A
Sender
B
Receiver
C
Sender & Receiver
D
All connected devices to the network
Explanation: 

Detailed explanation-1: -In asymmetric key cryptography, the private key is kept by one public key and one private key-to prevent unauthorized entry or usage. Anybody can use a public key to encrypt a document so that only the expected receiver can decrypt it with their private key.

Detailed explanation-2: -Asymmetric encryption algorithms use two different keys for encryption and decryption. The key used for encryption is the public key, and the key used for decryption is the private key. Both the keys must belong to the receiver.

Detailed explanation-3: -The encryption key is created and stored on the key management server. The key manager creates the encryption key through the use of a cryptographically secure random bit generator and stores the key, along with all it’s attributes, into the key storage database.

Detailed explanation-4: -There is no shared key. A message encrypted with a key can not be decrypted with the same key.

Detailed explanation-5: -Asymmetric keys are the foundation of Public Key Infrastructure (PKI) a cryptographic scheme requiring two different keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One key is published (public key) and the other is kept private (private key).

There is 1 question to complete.