PrepAway - Latest Free Exam Questions & Answers

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

Which statement describes how the sender of the message is verified when asymmetric
encryption is used?

PrepAway - Latest Free Exam Questions & Answers

A.
The sender encrypts the message using the sender’s public key, and the receiver decrypts the
message using the sender’s private key.

B.
The sender encrypts the message using the sender’s private key, and the receiver decrypts the
message using the sender’s public key.

C.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the
message using the receiver’s private key.

D.
The sender encrypts the message using the receiver’s private key, and the receiver decrypts
the message using the receiver’s public key.

E.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the
message using the sender’s public key.

Explanation:
http://www.cisco.com/en/US/tech/tk1132/technologies_white_paper09186a00800e79cb.shtml
Public-Key Cryptography and Asymmetric Encryption
In asymmetric encryption, two different keys are used to render data illegible to anyone who may
be eavesdropping on a conversation. The certificates contain the two components of asymmetric
encryption: public key and private key.
Data that is encrypted with the public key can be decrypted with the private key, and vice versa.
However, data encrypted with the public key cannot be decrypted with the public key. The parties
who need to encrypt their communications will exchange their public keys (contained in the
certificate), but will not disclose their private keys. The sending party will use the public key of the
receiving party to encrypt message data and forward the cipher text (encrypted data) to the other
party. The receiving party will then decrypt the cipher text with their private key.
Data encrypted with the public key cannot be decrypted with the public key. This prevents
someone from compromising the cipher text after acquiring both public keys by eavesdropping on
the certificate exchange.

2 Comments on “Which statement describes how the sender of the message is verified when asymmetric encryption is used?

  1. doger says:

    Wrong, it should be B instead of C.
    Sender of the message can be verified when he signs the message. Message is signed by sender’s private key, and anyone can verify sender by doing decryption via sender’s public key




    0



    0
    1. Anon says:

      Yup; very true. Definitely B instead of C on this one. Can’t validate the sender with the receivers key set. Can only validate the sender with the sender’s key set.




      0



      0

Leave a Reply