Questions
202580-ITIS-6200-051:ITIS-6200-081:ITIS-8200-051-XLSDX202580_Combined Quiz 5
Single choice
Suppose Alice encrypted a message using Bob's public key and sent it to Bob. If an attacker was able to intercept Alice-Bob message, which of the following can be compromised:
Options
A.Confidentiality
B.Integrity
C.Both confidentiality and integrity
D.Neither confidentiality nor integrity can be compromised
View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
When considering encryption with Bob's public key, the core idea is that only Bob, possessing his private key, can decrypt what Alice sent.
Option 1: Confidentiality. Since the attacker only intercepted the ciphertext and does not have Bob's private key, they should not be able to recover the plaintext. Therefore, confid......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?
Which cryptographic algorithm is widely used in PKI encryption?
Blank ______ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the received message?
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!