COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What process is described below?Two keys are used. One is yours and the other is the receiver’s. You send a message is your key. Then, that person sends it back in their key along with yours. You undo your key so that only their’s is left and resend the message.
A
Public key cryptology
B
Baconian Cipher
C
AUP
D
Pigpen Cipher
Explanation: 

Detailed explanation-1: -Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.

Detailed explanation-2: -In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption. The decryption key is kept private (hence the “private key” name), while the encryption key is shared publicly, for anyone to use (hence the “public key” name).

Detailed explanation-3: -Two mathematically related keys, one called the public key and another called the private key, are generated to be used together. The private key is never shared; it is kept secret and is used only by its owner. The public key is made available to anyone who wants it.

Detailed explanation-4: -Hashing can show that data has not changed in transmission, but on its own cannot demonstrate that the data originated with its supposed author. To do that, a digital signature should be used. Digital signatures use the sender’s private key to encrypt the hash.

There is 1 question to complete.