Which of the following BEST describes part of the PKI process?
User1 decrypts data with User2’s private key
User1 hashes data with User2’s public key
User1 hashes data with User2’s private key
User1 encrypts data with User2’s public key
In a PKI the sender encrypts the data using the receiver’s public key. The receiver decrypts the data using his
own private key.
PKI is a two-key, asymmetric system with four main components: certificate authority (CA), registration
authority (RA), RSA (the encryption algorithm), and digital certificates. Messages are encrypted with a public
key and decrypted with a private key.