MCQOPTIONS
Saved Bookmarks
| 1. |
Using public key cryptography, X adds a digital signature σ to a message M,encrypts 〈M,σ〉 and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations ? |
| A. | Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key |
| B. | Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key |
| C. | Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key. |
| D. | Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key. |
| Answer» D. Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key. | |