Encryption & Decryption - Example - Networking
Q. Encryption is done at A and decryption is done at B. A adds a digital signature s to message S using public key cryptography, encrypts. (Networking)- Published on 25 Jun 15a. Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.
b. Encryption: A’s public key followed by B’s private key;
Decryption: B’s public key followed by A’s private key.
c. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s private key.
d. Encryption: A’s private key followed by B’s private key;
Decryption: A’s public key followed by B’s public key.
ANSWER: Encryption: A’s private key followed by B’s public key;
Decryption: B’s private key followed by A’s public key.
Encryption is where plain text is converted into something which is random and meaningless(ciphertext) for the purpose of data security.
Decryption is where the ciphertext is converted into plain text or readable format.