COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice receives the message, she decrypts it using a private key. What kind of encryption process is this?
A
Symmetric Encryption
B
Public Key encryption
C
Vingenere Cipher
D
Firewall software
Explanation: 

Detailed explanation-1: -Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice’s public key. Alice can later decrypt the message with her private key.

Detailed explanation-2: -Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key-which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice’s Public Key to decrypt the message.

Detailed explanation-3: -Alice sends Bob a message and Encrypts it with the Public Key, that is known the world. Bob receives the message and decrypts it with his Private Key which is only known by him. This is the process of asymmetric encryption.

Detailed explanation-4: -Both Alice and Bob begin by generating a set of public and private keys. They then swap public keys with each other (Alice sends her public key to Bob and vice versa). Now Bob encrypts the sensitive document using Alice’s public key and sends it to her.

There is 1 question to complete.