Using asymmetric cryptography practices, Alex wants to send Jessica an encrypted message that he received from Joel. Additionally, Jessica wants to verify the message came from Alex by viewing his digital signature. Whose keys would be used for what in this scenario?

Using asymmetric cryptography practices, Alex wants to send Jessica an encrypted message that he received from Joel. Additionally, Jessica wants to verify the message came from Alex by viewing his digital signature. Whose keys would be used for what in this scenario?



Answer: Jessica's public key will encrypt the message, Jessica's private key would be used to view the message, Alex's private key would be used to encrypt the digest, and Alex's public key would be used by Jessica to decrypt the digest.


Learn More :

Cyber Security

Learn More Multiple Choice Question :