In public key cryptography, what information must the sender obtain from the recipient before sending data securely?

Study for the Khan Academy Internet Test. Master topics with detailed questions, hints, and insightful explanations. Prepare effectively and ace your exam!

Multiple Choice

In public key cryptography, what information must the sender obtain from the recipient before sending data securely?

Explanation:
Public key cryptography uses a pair of keys: a public key that can be shared openly and a private key that stays secret. To send data securely to someone, you encrypt the data with that person’s public key. Then only the recipient, who has the corresponding private key, can decrypt it. Because of that, you must obtain the recipient’s public key before sending. The private key must never be shared, and while a symmetric session key is often used in practice, it still needs to be securely shared—usually by encrypting it with the recipient’s public key. So the essential information to obtain is Computer B’s public key.

Public key cryptography uses a pair of keys: a public key that can be shared openly and a private key that stays secret. To send data securely to someone, you encrypt the data with that person’s public key. Then only the recipient, who has the corresponding private key, can decrypt it. Because of that, you must obtain the recipient’s public key before sending. The private key must never be shared, and while a symmetric session key is often used in practice, it still needs to be securely shared—usually by encrypting it with the recipient’s public key. So the essential information to obtain is Computer B’s public key.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy