Compare cert salaries and plan your next career move
nanga wrote: So its just to say " dude i assure u this came from me and anyone having my public key can read the data"
dynamik wrote: Bob wouldn't use his private key to encrypt data. People use their own private key to sign data, not encrypt it. This ensures integrity/non-repudiation, but not confidentiality. As stated, his public key is public, so anyone who has that can view the data. Instead, he would use the recipients public key to encrypt the data since the only person who can decrypt that is the recipient, with his private key.
nanga wrote: Ok here is a scenario and after that there is a question on concept "" Bob can encrypt data with his private key, and the receiver can then decrypt it with Bob’s public key. By decrypting the message with Bob’s public key, the receiver can be sure the message really came from Bob. A message can be decrypted with a public key only if the message was encrypted with the corresponding private key. "" does bob have a single private key ..bobs public key is available to everyone. so if a Man in the middle picks up this data encrypted with bobs private key, can he use the bobs public key to open the lock? or does bob encrypt data with a different private key each time
Compare salaries for top cybersecurity certifications. Free download for TechExams community.