Skip to content
Related Articles

Related Articles

ISRO | ISRO CS 2017 | Question 29
  • Last Updated : 15 Mar, 2018

Using public key cryptography, X adds a digital signature σ to a message M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations?
(A) Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key.
(B) Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key
(C) Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.
(D) Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key.


Answer: (C)

Explanation: Refer: GATE CS 2013 | Question 13
Correct answer is (C).

Quiz of this Question

My Personal Notes arrow_drop_up
Recommended Articles
Page :