The answers to the questions are given here.
Public key cryptography
- Answer: B. Using the public key for encryption and using the private key for decryption
Explanation: In asymmetric encryption, two keys are used – one for encryption and the other for decryption. Messages encrypted by one key can be decrypted by another key. These two keys are known as private keys and public keys. A private key is available only to the owner of the key and a public key is available in the public domain. Let's evaluate each option:
- A. Using the private key for encryption and using the public key for decryption – if a message is encrypted by the private key of the owner, anyone can decrypt it using the public key (as the public key is easily available), hence, the confidentiality of the message cannot be ensured.
- B. Using the public key for encryption and using the private key for decryption – if a message is encrypted by using the public key, then only the person...