Using public key cryptography, X adds a digital signature σ to a message M,encrypts 〈M,σ〉 and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations ?
Using public key cryptography, X adds a digital signature σ to a message M,encrypts 〈M,σ〉 and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations ? Correct Answer Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.
In public key which is also called asymmetric key cryptography encryption is done using sender's private key followed by reciever’s public key and decryption is done by reciver’s private key followed by sender’s public key.
মোঃ আরিফুল ইসলাম
Feb 20, 2025