Which statement describes how the sender of the message is verified when asymmetric encryption is used?

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

A.
The sender encrypts the message using the sender’s public key, and the receiver decrypts the message
using the sender’s private key.

B.
The sender encrypts the message using the sender’s private key, and the receiver decrypts the message
using the sender’s public key.

C.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the message
using the receiver’s private key.

D.
The sender encrypts the message using the receiver’s private key, and the receiver decrypts the message
using the receiver’s public key.

E.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the message
using the sender’s public key.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


EM

EM

why is C wrong ???

michael Zaki

michael Zaki

C is incorrect because using the receiver public key doesn’t verify who you are since it’s a public key any one can get it. The key here is in the phrasing of the question.
“sender of the message is verified” only the sender should have his private key.