PrepAway - Latest Free Exam Questions & Answers

Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe rece

Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a respons

e, he is unable to decrypt the response with the same key he used initially.

Which of the following would explain the situation?

A. An ephemeral key was used for one of the messages

B. A stream cipher was used for the initial email; a block cipher was us

ed for the reply

C. Out-of-band key exchange has taken place

D. Asymmetric encryption is being used

Explanation:

Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as the public key and the priv

ate key. The sender uses the public key to encrypt a message, and the receiver uses the private key to decrypt the message; what one key does, the other one undoes.


Leave a Reply