Question
In the context of asymmetric encryption, which of the
following is a key feature of public-private key pairs?Solution
Asymmetric encryption uses a pair of keys: a public key, shared openly, and a private key, kept confidential. In this system:
- Data encrypted using the private key can be decrypted by the corresponding public key , which is essential for digital signatures. For instance, signing a document with a private key allows recipients to verify its authenticity using the public key.
- Conversely, data encrypted with the public key can only be decrypted with the private key , ensuring secure transmission of sensitive information.
- Option A: While the keys are mathematically related, they are not interchangeable for encryption and decryption.
- Option B: The private key is not solely for encryption; it is often used for decryption or signing.
- Option D: The private key must remain confidential and is never shared between parties.
- Option E: Public-private key pairs are not directly used for hashing, which is a different cryptographic operation.
The Vimana in the Dravidian style of temple architecture is usually in which shape?
Which of the following is an example of Rabi crop?
Regarding RBI's Sovereign Green Bonds (SGrBs), which of the following statements is correct?
Which of the following is the most widely used method for refining impure metals?
Hot local wind that flows over north India in summer is known as:Â
What was the original name of ‘Gumani’, a famous poet of Kumaun?
Viksit Bharat@2047 is
Match the columns.
Column-AÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Column-B
i. Electric current�...
 What is the maximum limit for UPI123 Pay and UPI Lite Wallet transactions?
Amongst the following, an example of algae is _______