What should John do...
 
Notifications
Clear all

What should John do to communicate correctly using this type of encryption?

1 Posts
1 Users
0 Likes
108 Views
(@cainsmarshall)
Posts: 692
Noble Member
Topic starter
 

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP.

What should John do to communicate correctly using this type of encryption?

  • A . Use his own public key to encrypt the message.
    B. Use Marie's public key to encrypt the message.
    C. Use his own private key to encrypt the message.
    D. Use Marie's private key to encrypt the message.

Show Answer Hide Answer

Suggested Answer: B

Explanation:

When a user encrypts plaintext with PGP, PGP first compresses the plaintext. The session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient's public key https://en.wikipedia.org/wiki/Pretty_Good_Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a username or an e-mail address.

https://en.wikipedia.org/wiki/Public-key_cryptography

Public key encryption uses two different keys. One key is used to encrypt the information and the other is used to decrypt the information. Sometimes this is referred to as asymmetric encryption because two keys are required to make the system and/or process

work securely. One key is known as the public key and should be shared by the owner with anyone who will be securely communicating with the key owner. However, the owner’s secret key is not to be shared and considered a private key. If the private key is shared with unauthorized recipients, the encryption mechanisms protecting the information must be considered compromised.
 
Posted : 06/12/2022 5:34 am
Topic Tags

Latest EC-Council 312-50v12 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: