In order to verify the authenticity of a digital signature we need to encrypt the initial message with the sender's private key.
The receiver then can verify the authenticity by decrypting the message with the sender's public key.
https://docs.huihoo.com/globus/gt4-tutorial/ch09s03.html
Thanks stoneface, I looked this up and am expanding why: as the question is dealing with digital signatures, otherwise, the answer would be 'B' if it dealt with messaging.
There are 2 general ways to use asymetric algorithm.
1 - For communication between 2 hosts: If bob sends a message to Alice, bob uses Alice's public key to encrypt the message, and Alice uses her private key to decrypt the message.
2 - For digital signature/Authentication: If ALice need to authenticate Bob, BOB uses his private key to sign the message, and Alice uses the public key of bob to decrypt the message. This process help to make sure the signature is owned by Bob.
On this example, A is totally correct.
Didn't knew there were different usage for asymmetric cryptography in terms of mail usage. Was only aware of S/MIME which uses recipient's public key to encrypt the message and uses the recipient's private key to decrypt. Thanks for this info!
Trick question. It is asking for digital signatures, not for the en- and decryption of information that is confidential. And therefore the answer is A. The recipient can use the public key to confirm the identity of the sender.
answer is B
Asymmetric key algorithms use a public key for encryption and a private key for
decryption. Examples include the RSA, Diffie-Hellman, El Gamal, and elliptic curve
cryptography standards
Digital signatures work by proving that a digital message or document was not modified—intentionally or unintentionally—from the time it was signed. Digital signatures do this by generating a unique hash of the message or document and encrypting it using the sender's private key. The hash generated is unique to the message or document, and changing any part of it will completely change the hash.
Once completed, the message or digital document is digitally signed and sent to the recipient. The recipient then generates their own hash of the message or digital document and decrypts the sender's hash (included in the original message) using the sender's public key. The recipient compares the hash they generate against the sender's decrypted hash; if they match, the message or digital document has not been modified and the sender is authenticated.
https://www.cisa.gov/news-events/news/understanding-digital-signatures
I didn't expect they call the process of signing "encrypt"... So stupid and misleading. Everywhere I read the process of encryption is changing of clear-text data into hiden(encrypted) ciphertext so it can't be read without decryption.
From ChatGPT:
The correct answer is B. the sender's public key and decrypted with the sender's private key.
In digital signatures, the message is first hashed (using a cryptographic hash function) to generate a fixed-length digest. Then, this digest is encrypted with the sender's private key to create the signature. The recipient of the message can then verify the signature by decrypting it using the sender's public key, which should result in the same hash value. If the decrypted hash matches the hash value calculated from the received message, it confirms the integrity of the message and the authenticity of the sender.
So, digital signatures use asymmetric encryption in such a way that the message is encrypted with the sender's private key and decrypted with the sender's public key for verification.
Digital signatures use asymmetric encryption, but when it comes to signing a message or file with a digital signature, the process is as follows:
A. The sender's private key is used to encrypt the hash or digest of the message, and the recipient uses the sender's public key to decrypt the hash or digest and verify the authenticity of the signature.
So, for digital signatures, the correct answer is A.
Digital signatures use asymmetric encryption. This means the message is encrypted with:
A. the sender's private key and decrypted with the sender's public key. Most Voted
B. the sender's public key and decrypted with the sender's private key.
C. the sender's private key and decrypted with the recipient's public key.
D. the sender's public key and decrypted with the recipient's private key.
ChatGPT
B. the sender's public key and decrypted with the sender's private key.
I find it sorta funny that Bard and Bing give the answer as C. Given that I am having a hard time understanding how things work, I have no clue if the answer is A, B, or C.
The answer is A. None of the other answers make sense. First of all, C and D suggest using the public and private keys of two different keypairs, which would not work at all.
If you chose B, that would imply that the sender's private key was being shared with the recipient to decrypt the message, which defeats the entire purpose of asymmetric encryption.
A describes the process of digital signatures. If the sender encrypts something with their private key, the message can only be decrypted with the sender's public key. Therefore, you know that the sender was the true sender, because attempting to decrypt using anyone else's key would not work. This process of digital signing would typically take place after the sender encrypts the message using the recipient's public key to protect confidentiality.
The purpose of using the sender's private key for encryption is to create a unique digital signature that can only be generated by the sender. This provides authenticity and non-repudiation, as only the sender possessing the corresponding private key can create a valid signature. The recipient can then decrypt the signature using the sender's public key to verify the integrity and authenticity of the message.
guys it's B
the sender encrypts the message with your public key and you decrypt it by using your private key, your public key is shared with others, and they can not decrypt the message with your public key.
These answer choices are worded wrong. Asymmetric encryption uses two keys: public and private. Anything encrypted with the public key can only be decrypted with the matching private key. Anything encrypted with the private key can only be decrypted with the matching public key. For digital signatures, to send the message with encryption, you use the sender’s private key and decrypt the message with the sender’s public key.
asymmetric encryption
Also called public key cryptography, a data encryption system that uses two mathematically derived keys to encrypt and decrypt a message—a public key, available to everyone, and a private key, available only to the owner of the key.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
stoneface
Highly Voted 2 years, 7 months ago[Removed]
1 year, 2 months agoKnowledge33
Highly Voted 2 years, 6 months agoscarceanimal
2 years, 2 months agoXynned
1 year, 9 months agoGigi42
Most Recent 10 months, 4 weeks agoMehe323
12 months agobknum9
1 year, 2 months agodfc6822
1 year, 3 months agoVEE224
1 year, 4 months agoabove
1 year, 6 months agokigikik881
1 year, 6 months agodaddylonglegs
1 year, 6 months agolamrine04
1 year, 9 months agoTuanDinh
1 year, 8 months agoOld_Boy_
1 year, 5 months agoProtract8593
1 year, 9 months agoAleem001
1 year, 9 months agosirpsionics
1 year, 9 months agodaddylonglegs
1 year, 6 months agoApplebeesWaiter1122
1 year, 9 months agoDutch012
1 year, 11 months agoRobbieT
2 years agomkimchi
2 years agodaddylonglegs
1 year, 6 months agoMGMKING
2 years ago