Card 88 / 125: Alice and Bob want to exchange highly confidential business emails. So they started experimenting with the asymmetric key algorithms. Each of them generated a public and private key pair, exchanged the public key by post, and they are now ready to correspond. Alice used the public key of Bob to encrypt and send their first top secret email. What is true?
A)
Alice should have used her own private key to encrypt the above mentioned message
B)
Only Bob can decrypt and read the message using Alice's public key
C)
Only Bob can decrypt and read the message using his own private key.
D)
Anyone who can obtain Bob public key would be able to decrypt and read Alice's message
Answer:
C) Only Bob can decrypt and read the message using his own private key.
Previous Card | ← Previous Card Button |
Next Card | → Next Card Button |
Flip Card | Space-Bar |
|
Oracle Certified Java Enterprise Architect
Author:
JavaChamp TeamSenior Java Developer
QuizOver.com
Germany
Access: |