COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Jack wants to send an encrypted message to Jill using asymmetric cryptography.Which of the following is TRUE on the problem Jack may face?
A
Jill’s private key may not belong to Jill.
B
Jill’s public key may not belong to Jill.
C
Jack’s public key may not belong to Jack.
D
Jack’s private key may not belong to Jack.
Explanation: 

Detailed explanation-1: -Asymmetric encryption: A set of public and private keys are used together, where the private key is retained by the user who generated it, and the public key is available publicly. The sender sends the message by encrypting it with the receiver’s public, and the receiver decrypts it using their private key.

Detailed explanation-2: -Public-key (asymmetric) cryptography requires the use of a public-key and a private key.

There is 1 question to complete.