Western Governors University (WGU) ITEC2112 D315 Network and Security - Foundations Pre-assessment Practice Exam

Question: 1 / 400

If Bob receives a message from Alice using asymmetric cryptography, which key does he use to decrypt it?

Alice's public key

Bob's private key

In asymmetric cryptography, two keys are utilized: a public key and a private key, each belonging to the respective parties. When Bob receives a message from Alice that has been encrypted with his public key, he must use his own private key to decrypt it. This is a fundamental principle of asymmetric encryption, which ensures that only the intended recipient, in this case, Bob, can access the message content by using their corresponding private key.

If Alice encrypts a message with Bob's public key, only Bob, who possesses the matching private key, can successfully decrypt and read the message. This mechanism guarantees confidentiality and secures the communication between the two parties.

Get further explanation with Examzify DeepDiveBeta

Alice's private key

Bob's public key

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy