Question
In the context of asymmetric encryption, which of the
following is a key feature of public-private key pairs?Solution
Asymmetric encryption uses a pair of keys: a public key, shared openly, and a private key, kept confidential. In this system:
- Data encrypted using the private key can be decrypted by the corresponding public key , which is essential for digital signatures. For instance, signing a document with a private key allows recipients to verify its authenticity using the public key.
- Conversely, data encrypted with the public key can only be decrypted with the private key , ensuring secure transmission of sensitive information.
- Option A: While the keys are mathematically related, they are not interchangeable for encryption and decryption.
- Option B: The private key is not solely for encryption; it is often used for decryption or signing.
- Option D: The private key must remain confidential and is never shared between parties.
- Option E: Public-private key pairs are not directly used for hashing, which is a different cryptographic operation.
Which minister of India has chaired the 9th BRICS Science & Technology Ministers meet?
What is the maximum number of judges allowed in the Supreme Court of India as of 2022?
Area of a map is measured with the help of ____________
Appointments for all India Services are made by:
The National Commission for Scheduled Castes is established by which article of the Constitution?
Which of the following is not correct with reference to National Emergency?Â
Pankaj's initiative to protect tribal rights in Assam, Meghalaya, Tripura, and Mizoram is aligned with which schedule of the Indian Constitution?
Which Five Year Plan in India is often referred to as the Rao-Manmohan Singh Model of economic liberalization?Â
What is the function of the Preamble to the Indian Constitution?
Which of the following pairs is/are correctly matched?
Mars Mission               Country
1. Tianwen-1Â Â ...