Skip to content
Related Articles

Related Articles

ISRO | ISRO CS 2017 | Question 29
  • Last Updated : 15 Mar, 2018
GeeksforGeeks - Summer Carnival Banner

Using public key cryptography, X adds a digital signature σ to a message M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations?
(A) Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key.
(B) Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key
(C) Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.
(D) Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key.


Answer: (C)

Explanation: Refer: GATE CS 2013 | Question 13
Correct answer is (C).

Quiz of this Question

Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.

My Personal Notes arrow_drop_up
Recommended Articles
Page :