Start learning 50% faster. Sign in now
Public-key encryption using the recipient’s public key is the best choice for ensuring data confidentiality during transmission. This method leverages asymmetric encryption, where the recipient’s public key is used to encrypt the data, and only the recipient can decrypt it using their private key. This ensures that even if the data is intercepted during transmission, it cannot be read by unauthorized parties without access to the recipient's private key. For example, when a user sends an email encrypted with the recipient's public key, only the recipient can decrypt it, preserving confidentiality. Asymmetric encryption also avoids the risk of key compromise associated with pre-shared keys in symmetric encryption. Moreover, it scales better for secure communication across multiple parties because each participant needs only one pair of keys (public and private) instead of maintaining numerous shared keys. Why Other Options Are Incorrect:
Which film won the Best Feature Film award at the 69th edition of the National Film Awards?
Which of the following states/regions has the highest percentage of area under total Mangrove cover?
In which state is the archaeological site of Surkotada situated?
Which of the following states of India has the literacy-rate of more than 90 percent as per 2011 census?
The Kanger Valley National Park is located in which of the following states?
Who among the following is the author of the book 'The Zoya factor'?
Who is appointed as the Director General of World Health Organization for the second term for a period of five years?
The full form of ‘WiFi’ is:
Constitutions limit the power of government in many ways. The most common way of limiting the power of government is to specify certain ______ that all ...
Who has been conferred with the Rajiv Gandhi Khel Ratna Award for the year 2018?