COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If Bob wants to send a encrypted message to Alice, which key does he use?
A
Bob private key
B
Bob public key
C
Alice public key
D
Alice private key
Explanation: 

Detailed explanation-1: -Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice’s public key. Alice can later decrypt the message with her private key.

Detailed explanation-2: -If Bob wants to send Alice a secret message, he encrypts it with Alice’s public key. Then no one but Alice can decrypt it. Only her private key can undo the encryption, and no one can figure out the private key from the public key.

Detailed explanation-3: -Public key, or asymmetric, encryption uses a public key that can be shared with others and a private key. Once shared, others can use the public key to encrypt a message and send it to the owner of the public key. The message can only be decrypted using the corresponding private key, also called the decryption key.

Detailed explanation-4: -Overview Alice wants to send a message to Bob. Both Alice and Bob share the same secret key. To encrypt the message Alice XORs her message with the shared secret key. To decrypt the message Bob also XORs the message with his (the same) secret key.

There is 1 question to complete.