Question Bank - Computer Networks

Here's the question bank on all the computer networks topics.

Using public key cryptography, X adds a digital signature ? to message M, encrypts , and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?

A.
Encryption: Xs private key followed by Ys private key; Decryption: Xs public key followed by Ys public key
B.
Encryption: Xs private key followed by Ys public key; Decryption: Xs public key followed by Ys private key
C.
Encryption: Xs public key followed by Ys private key; Decryption: Ys public key followed by Xs private key
D.
Encryption: Xs private key followed by Ys public key; Decryption: Ys private key followed by Xs public key

Solution:

The correct answer is option 4.As previously indicated, X adds a digital signature to message M, encrypts M, and sends it to Y.The following key sequences are used for the operations to ensure that Y receives the message and is able to decrypt it.Encryption Xs private key followed by Ys public key In order to guarantee authenticity and confidentiality, the message should be encrypted using the sender's private key and receiver's public key.Decryption Ys private key followed by Xs public key Receiver Y will need to decrypt it using its own private key and send X's public key when received with the encrypted message.Hence the correct answer is Encryption: Xs private key followed by Ys public key; Decryption: Ys private key followed by Xs public key.

For more questions,

Click Here

Download Gyanm App

free current affairs for competitive exams

Scan QR code to download our App for
more exam-oriented questions

free current affairs for competitive exams

OR
To get link to download app

Thank you! Your submission has been received. You will get the pdf soon. Call us if you have any question: 9117343434
Oops! Something went wrong while submitting the form.