...
Research Aptitude
July 26, 2024
Normalization
July 27, 2024
Research Aptitude
July 26, 2024
Normalization
July 27, 2024

Computer-Networks

Question 356
Which of the following is false?
A
Public-key cryptography is also known as asymmetric cryptography
B
Asymmetric cryptography uses a pair of cryptographic keys
C
A message encrypted with the private key can be decrypted only with the corresponding public key
D
The private key is kept secret, while the public key is widely distributed
Question 356 Explanation: 
3 is false because a message encrypted with the private key can be decrypted only with the corresponding public key in asymmetric key cryptography but in symmetric key cryptography a message encrypted with the private key can be decrypted only with the same private key.
Correct Answer: C
Question 356 Explanation: 
3 is false because a message encrypted with the private key can be decrypted only with the corresponding public key in asymmetric key cryptography but in symmetric key cryptography a message encrypted with the private key can be decrypted only with the same private key.

Leave a Reply

Your email address will not be published. Required fields are marked *