NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
If Bob receives Alice’s public key from a public directory, how does he know the key really came from Alice?
|
From acknowledgement from Alice
|
|
From a trusted certificate authority
|
|
From your browser database
|
|
From Alice server
|
Explanation:
Detailed explanation-1: -Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice’s public key. Alice can later decrypt the message with her private key.
Detailed explanation-2: -Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key-which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice’s Public Key to decrypt the message.
There is 1 question to complete.