Question
In the context of asymmetric encryption, which of the
following is a key feature of public-private key pairs?Solution
Asymmetric encryption uses a pair of keys: a public key, shared openly, and a private key, kept confidential. In this system:
- Data encrypted using the private key can be decrypted by the corresponding public key , which is essential for digital signatures. For instance, signing a document with a private key allows recipients to verify its authenticity using the public key.
- Conversely, data encrypted with the public key can only be decrypted with the private key , ensuring secure transmission of sensitive information.
- Option A: While the keys are mathematically related, they are not interchangeable for encryption and decryption.
- Option B: The private key is not solely for encryption; it is often used for decryption or signing.
- Option D: The private key must remain confidential and is never shared between parties.
- Option E: Public-private key pairs are not directly used for hashing, which is a different cryptographic operation.
Which one of the following is not. the same as the other three ?
The widely used 7-bit ASCII code is employed:
To save an existing file with new name at a new location we should us _______ command.
Which type of computer security attack involves exploiting software vulnerabilities that have not been patched or updated?
URL stands for
Holding the mouse button down while moving an object or text is known as _________.
Non impact printer
Which one is the Open-source operating system?
What does a light pen contain?Â
Which of the following options is used to check spelling and grammar in a Microsoft Word document?