Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?
Asymmetric Encryption uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption. As implied in the name, the Private Key is intended to be private so that only the authenticated recipient can decrypt the message.
Answer is none other than C.
According to ChatGPT, when encrypting a message, the key used depends on the goal—either confidentiality or authenticity. In this case, latter applies; Authenticity and Integrity (Digital Signature). Therefore, the sender's private key is used to sign the message (or a checksum/hash of it) while the sender's public key is used by the recipient to verify the signature.
ChatGPT answer:
Correct answer: A. Alice's public key
Explanation: Bob wants to ensure that Alice can check whether his message has been tampered with. To achieve this, he encrypts the checksum of the message using asymmetric cryptography. In asymmetric cryptography, there are two keys: a public key and a private key. The public key is used for encryption, and the private key is used for decryption.
Bob uses Alice's public key for encryption: Bob wants Alice to be able to decrypt and verify the checksum. In asymmetric cryptography, anything encrypted with the public key can only be decrypted with the corresponding private key. Therefore, by encrypting the checksum with Alice's public key, only Alice (who possesses the corresponding private key) can decrypt and verify it.
Bob uses Alice's public key to encrypt the checksum. This is a common practice in asymmetric cryptography. Bob uses Alice's public key for encryption because only Alice, with access to the corresponding private key, can decrypt the message. This ensures that only Alice can verify the integrity of the message by decrypting the checksum and comparing it to a newly calculated checksum of the received message. Using Alice's public key for encryption adds an extra layer of security to ensure that the checksum is only accessible to the intended recipient.
Simply put, what is required is to ensure that the message has not been tampered with. What is correct is that the message is signed by the sender, which is bob by its public key. Method a is confidential, that is, the message can only be opened by the recipient. If the answer is C
No really... I think is A, becausw you use your private key foro sign a message (digital signature), but you use the public key of the destinatary for encrypt the message!
In this case i think IS similar, so the correct option is A. Finally.
Bob will digitally sign the message using his private key.
Bob will encrypt the message using Alice's public key - So only Alice can decrypt the message.
The question talks about encryption.
Hence Answer is A - Alice's public key
A.
Sign a message: sender's privatek-> senders's publick
encrip. a message: receiver's publick-> receivers's private
Here are "encripting", they never say "sign".
The answer is A,
Creating a checksum of a message does not equate to signing it. Bob just want Alice to be able to check if the message is has been tampered with. He does not want to sign it to proof that he is the sender of the message.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
lawbut2
Highly Voted 3 years agomicka69
Highly Voted 3 years agoBrian_Tseng
2 years, 10 months agoKumaraRashu
2 years, 9 months agosam_kdr
Most Recent 3 weeks, 6 days agoSpam_Protection
8 months, 2 weeks agoYourFriendlyNeighborhoodSpider
1 year agosudowhoami
1 year ago12787
1 year, 1 month agoVincent_Lu
1 year, 1 month ago12787
1 year, 1 month agoBuksi
1 year, 5 months agoakailah88
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agovictorfs
1 year, 6 months agoMGRavindra
1 year, 8 months agoShin_Frankie
1 year, 9 months agoVOAKDO
1 year, 10 months agojasonkym
1 year, 11 months ago