Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-81 Topic 5 Question 36 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 36
Topic #: 5
[All 212-81 Questions]

During the process of encryption and decryption, what keys are shared?

Show Suggested Answer Hide Answer
Suggested Answer: A

Public keys

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.

Alice and Bob have two keys of their own --- just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message assuming he's kept it secret, of course.

Alice and Bob do not need to plan anything ahead of time to communicate securely: they generate their public-private key pairs independently, and happily broadcast their public keys to the world at large. Alice can rest assured that only Bob can decrypt the message she sends because she has encrypted it with his public key.


Contribute your Thoughts:

Vinnie
5 months ago
I think it's private keys, as they are used for decryption to access the original data.
upvoted 0 times
...
Samira
5 months ago
I agree with Shawnna, because public keys are used for encryption and private keys for decryption.
upvoted 0 times
...
Shawnna
5 months ago
I believe it's a combination of public and private keys.
upvoted 0 times
...
Bernadine
5 months ago
B) Public and private keys, got it. Now, who wants to share their credit card numbers for a *totally secure* transaction?
upvoted 0 times
Freida
5 months ago
B) Public and private keys
upvoted 0 times
...
Aide
5 months ago
A) Public keys
upvoted 0 times
...
...
Hillary
5 months ago
I think the keys shared are public keys.
upvoted 0 times
...
Jaleesa
5 months ago
Hmm, I'm feeling a bit *private* about my encryption keys. Maybe I'll just use a crayon and a napkin instead.
upvoted 0 times
Joni
4 months ago
User passwords are not typically shared during encryption and decryption.
upvoted 0 times
...
Cornell
5 months ago
Using public keys is a common practice for sharing keys securely.
upvoted 0 times
...
Karan
5 months ago
I prefer to keep my encryption keys private, so I would choose private keys.
upvoted 0 times
...
Devora
5 months ago
I think during encryption and decryption, public and private keys are shared.
upvoted 0 times
...
...
Coleen
5 months ago
D) Private keys? Nah, that's only half the equation. Gotta share that public key too for it to work.
upvoted 0 times
Delsie
5 months ago
A) Public keys
upvoted 0 times
...
Paul
5 months ago
B) Public and private keys
upvoted 0 times
...
...
Ma
6 months ago
User passwords? Really? That's just asking for trouble. Stick to the crypto, folks!
upvoted 0 times
...
Lou
6 months ago
Looks like the answer is B) Public and private keys. Can't have encryption without the full key pair!
upvoted 0 times
Walton
5 months ago
B) Public and private keys are shared to ensure secure communication.
upvoted 0 times
...
Shenika
5 months ago
A) Public keys are shared during encryption and decryption.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77