In public key cryptography, how are the two keys used?

Study for the Khan Academy Internet Test. Master topics with detailed questions, hints, and insightful explanations. Prepare effectively and ace your exam!

Multiple Choice

In public key cryptography, how are the two keys used?

Explanation:
Public-key cryptography uses a pair of keys: a public key that can be shared openly and a private key that is kept secret. When you want to send a confidential message to someone, you encrypt it with that person’s public key. Anyone can encrypt in this way, but only the recipient who holds the private key can decrypt the message. This is why the correct description is that the recipient’s public key encrypts the data and the recipient’s private key decrypts. The same key isn’t used for both encryption and decryption, and public keys can also be used for digital signatures in a different use case, where the private key signs and the public key verifies.

Public-key cryptography uses a pair of keys: a public key that can be shared openly and a private key that is kept secret. When you want to send a confidential message to someone, you encrypt it with that person’s public key. Anyone can encrypt in this way, but only the recipient who holds the private key can decrypt the message. This is why the correct description is that the recipient’s public key encrypts the data and the recipient’s private key decrypts. The same key isn’t used for both encryption and decryption, and public keys can also be used for digital signatures in a different use case, where the private key signs and the public key verifies.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy