Start learning 50% faster. Sign in now
Public-key encryption using the recipient’s public key is the best choice for ensuring data confidentiality during transmission. This method leverages asymmetric encryption, where the recipient’s public key is used to encrypt the data, and only the recipient can decrypt it using their private key. This ensures that even if the data is intercepted during transmission, it cannot be read by unauthorized parties without access to the recipient's private key. For example, when a user sends an email encrypted with the recipient's public key, only the recipient can decrypt it, preserving confidentiality. Asymmetric encryption also avoids the risk of key compromise associated with pre-shared keys in symmetric encryption. Moreover, it scales better for secure communication across multiple parties because each participant needs only one pair of keys (public and private) instead of maintaining numerous shared keys. Why Other Options Are Incorrect:
When two ice cubes are pressed together, they join to form one cube. Which one of the following helps to hold them together?
Which one of the following does not figure in the list of languages in the 8th schedule of the Constitution of India?
Which leader is called the 'father' of India's social reform movement?
How many bits are there in the ethernet address?
What happens if an iron nail gets immersed in CuSO4 solution for few minutes?
What will come in place of the question mark (?) in the following equation, if ‘−’ is interchanged with ‘×’ and ‘÷’ is interchanged with...
Recently, Cannes Film Festival was held in
For the first time in India, medical benefit as a non-cash benefit was provided under
Consider the following statements: India had plan holiday during 1966-69 due to
1. Indo-Pakistan conflict in 1965.
2. Severe drought fo...
In how many states was the first round of Mission Indradhanush (IMI) 4.0 organized by the Union Ministry of Health and Family Welfare in February 2022, ...