Encryption & Decryption - Example - Networking

Q.  Encryption is done at A and decryption is done at B. A adds a digital signature s to message S using public key cryptography, encrypts. (Networking)
- Published on 25 Jun 15

a. Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.
b. Encryption: A’s public key followed by B’s private key;
Decryption: B’s public key followed by A’s private key.
c. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s private key.
d. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s public key.

ANSWER: Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.
 
Encryption is where plain text is converted into something which is random and meaningless(ciphertext) for the purpose of data security.
Decryption is where the ciphertext is converted into plain text or readable format.

Post your comment / Share knowledge


Enter the code shown above:

(Note: If you cannot read the numbers in the above image, reload the page to generate a new one.)