CompleteGATE Doubts Forum
0 like 0 dislike
100 views
  1. Using public key cryptography, X adds a digital signature σ to message M, encrypts <M, σ>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations? 

(A) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key

(B) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key

(C) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key

(D) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key 

asked Jul 17, 2016 in Computer Networks by CompleteGATE-AskUS (3,550 points) | 100 views

1 Answer

0 like 0 dislike

(D) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key

answered Jul 17, 2016 by ebeisaac (13,250 points)
Welcome to Completegate AskUs, A place where you can ask questions regarding videos located at Youtube Channel and receive answers from our experts.

Sign up for our newsletter to receive the latest news and event postings.

Best Users 12/2018
  1. CompleteGATE-AskUS

    3550 Points

  2. Asma Abbasi

    200 Points

  3. Henry

    150 Points

  4. SilverChat

    140 Points

Rewards per month
First Winner: 0 INR (Not Started)
Second Winner: 0 INR (Not Started)

×

Like us on Facebook

Show your Support. Become a FAN!

106 questions
100 answers
2 comments
48 users