Research Aptitude
July 26, 2024Normalization
July 27, 2024Computer-Networks
|
Question 356
|
Which of the following is false?
|
Public-key cryptography is also known as asymmetric cryptography
|
|
|
Asymmetric cryptography uses a pair of cryptographic keys
|
|
|
A message encrypted with the private key can be decrypted only with the corresponding public key
|
|
|
The private key is kept secret, while the public key is widely distributed
|
Question 356 Explanation:
3 is false because a message encrypted with the private key can be decrypted only with the corresponding public key in asymmetric key cryptography but in symmetric key cryptography a message encrypted with the private key can be decrypted only with the same private key.
Correct Answer: C
Question 356 Explanation:
3 is false because a message encrypted with the private key can be decrypted only with the corresponding public key in asymmetric key cryptography but in symmetric key cryptography a message encrypted with the private key can be decrypted only with the same private key.
