How can confidentiality and authentication be achieved using public key cryptography?

What will be an ideal response?


If confidentiality is a major concern for User A, she encrypts the message with the recipient's public key. That way, only the recipient can decrypt the message with his private key. If User A wants to assure User B that she is indeed the person sending the message (authentication), she can encrypt the message with her private key. After all, she's the only person who possesses her private key.

Computer Science & Information Technology

You might also like to view...

For the linked list implementation of the stack, where are the pushes and pops performed?

a. Push in front of the first element, pop the first element b. Push after the last element, pop the last element c. Push after the last element, pop the first element d. Push in front of the first element, pop the last element e. Push after the first element, pop the first element

Computer Science & Information Technology

?_____ is a full-featured program that holds the dominant share of the project management software market.

A. ?Apptivo B. ?GanttProject C. ?Microsoft Project D. ?Gantter

Computer Science & Information Technology

Which Internet communication service can you use to transfer items to and from other computers on the Internet?

A. VoIP B. FTP C. Email D. IM

Computer Science & Information Technology

Cloud computing is an example of a social networking site.

a. true b. false

Computer Science & Information Technology