...
Question 3352 – Mathematical-Reasoning
May 1, 2024
Question 3478 – Data-Interpretation
May 1, 2024
Question 3352 – Mathematical-Reasoning
May 1, 2024
Question 3478 – Data-Interpretation
May 1, 2024

Question 1435 – ISRO-2017 December

Using public key cryptography, X adds a digital signature σ to a message M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations?

Correct Answer: C

Question 4 Explanation: 

Encryption: Source has to encrypt with its private key for forming Digital signature for Authentication. Source has to encrypt the (M, σ) with Y’s public key to send it confidentially.
Decryption: Destination Y has to decrypt first with its private key, then decrypt using source public key.
A
Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key.
B
Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key
C
Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.
D
Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key.
0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
error: Alert: Content selection is disabled!!