In public key cryptography, what information must the sender obtain from the recipient before sending data securely?

Study with Khan Academy's The Internet Test. Prepare with dynamic questions, interactive hints, and detailed explanations. Ace your exam confidently!

Multiple Choice

In public key cryptography, what information must the sender obtain from the recipient before sending data securely?

Explanation:
Public key cryptography uses a pair of keys: a public key that can be shared openly and a private key that stays secret. To send data securely to someone, you encrypt the data with that person’s public key. Then only the recipient, who has the corresponding private key, can decrypt it. Because of that, you must obtain the recipient’s public key before sending. The private key must never be shared, and while a symmetric session key is often used in practice, it still needs to be securely shared—usually by encrypting it with the recipient’s public key. So the essential information to obtain is Computer B’s public key.

Public key cryptography uses a pair of keys: a public key that can be shared openly and a private key that stays secret. To send data securely to someone, you encrypt the data with that person’s public key. Then only the recipient, who has the corresponding private key, can decrypt it. Because of that, you must obtain the recipient’s public key before sending. The private key must never be shared, and while a symmetric session key is often used in practice, it still needs to be securely shared—usually by encrypting it with the recipient’s public key. So the essential information to obtain is Computer B’s public key.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy