COMPUTER SYSTEMS
ARCHITECTURE OF 8085
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
What type of key can be freely shared with anyone so that they can encrypt a message?
|
Personal key
|
|
Private key
|
|
Free key
|
|
Public key
|
Explanation:
Detailed explanation-1: -Public keys have been described by some as being like a business’ address on the web – it’s public and anyone can look it up and share it widely. In asymmetric encryption, public keys can be shared with everyone in the system. Once the sender has the public key, he uses it to encrypt his message.
Detailed explanation-2: -Explanation: In public-key (also known as asymmetric-key) encryption techniques, there are two different keys, the public key and the private key, used to encrypt and decrypt the data. Explanation: This happens when particularly if the encryption key is publicly available.
There is 1 question to complete.