New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 2 Question 30 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 30
Topic #: 2
[All 212-81 Questions]

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Show Suggested Answer Hide Answer
Suggested Answer: D

Vigenre

https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

The Vigenre cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

First described by Giovan Battista Bellaso in 1553, the cipher is easy to understand and implement, but it resisted all attempts to break it until 1863, three centuries later. This earned it the description le chiffre indchiffrable (French for 'the indecipherable cipher'). Many people have tried to implement encryption schemes that are essentially Vigenre ciphers. In 1863, Friedrich Kasiski was the first to publish a general method of deciphering Vigenre ciphers.


Contribute your Thoughts:

0/2000 characters
Shalon
3 months ago
I thought private keys were for encryption, not public ones?
upvoted 0 times
...
Magdalene
3 months ago
Yup, Alice's public key is the right choice!
upvoted 0 times
...
Laurene
3 months ago
Wait, why not just use his own private key? Seems off.
upvoted 0 times
...
Emiko
4 months ago
Totally agree, that's how asymmetric encryption works!
upvoted 0 times
...
Jesusa
4 months ago
He should use Alice's public key to encrypt the message.
upvoted 0 times
...
Amie
4 months ago
I’m pretty confident that using Alice's public key is the correct answer, as it ensures only she can decrypt it with her private key.
upvoted 0 times
...
Stevie
4 months ago
I feel a bit confused; I thought Bob's private key was involved somehow, but that doesn't seem right for this scenario.
upvoted 0 times
...
Dottie
4 months ago
I remember a practice question where we had to decide which key to use for encryption, and it was definitely the recipient's public key.
upvoted 0 times
...
Janine
5 months ago
I think Bob should use Alice's public key to encrypt the message, but I'm not entirely sure if that's the right approach.
upvoted 0 times
...
Martin
5 months ago
I'm not too sure about this one. Asymmetric cryptography can be tricky, and I don't want to overthink it. I'll go with Alice's public key, but I'm not 100% certain that's the right answer.
upvoted 0 times
...
Viola
5 months ago
Okay, let me think this through. Bob wants to send a message to Alice, and he's using asymmetric cryptography. So he needs to use Alice's key to encrypt the message, and only Alice will be able to decrypt it with her private key. I'm pretty confident that the answer is Alice's public key.
upvoted 0 times
...
Malcolm
5 months ago
Hmm, this seems straightforward. I think Alice's public key is the right answer since Bob wants to encrypt the message so that only Alice can decrypt it.
upvoted 0 times
...
Reena
5 months ago
I'm a bit confused. Isn't the whole point of asymmetric cryptography that you use the recipient's public key to encrypt the message? I'm not sure if I'm remembering that correctly.
upvoted 0 times
...
Alona
5 months ago
Hmm, I'm a bit unsure about this. I'll need to review my notes on service architecture patterns to make sure I understand the tradeoffs between these two approaches.
upvoted 0 times
...
Colette
5 months ago
This seems like a straightforward question about change management tactics. I'm pretty confident I can identify the right approach here.
upvoted 0 times
...
Kate
5 months ago
Hmm, I'm a bit unsure about this one. I need to carefully read through the details and think through the different types of antitrust violations.
upvoted 0 times
...
Tyra
5 months ago
Based on my understanding, the key here is that the chosen practice needs to assess and authorize any changes that could impact services. I think C - Change enablement is the best fit, as it's focused on managing the entire change process.
upvoted 0 times
...
Fernanda
10 months ago
I'm going with C, Alice's public key. Anything else would just be a recipe for disaster, like sending a message to myself and wondering why nobody can read it.
upvoted 0 times
Emmanuel
9 months ago
C) Bob's public key wouldn't work either. It's meant for encryption, but Alice wouldn't be able to decrypt with it.
upvoted 0 times
...
Quentin
9 months ago
B) Using Bob's private key would be a mistake. It's meant for decrypting, not encrypting messages.
upvoted 0 times
...
Anjelica
9 months ago
A) Alice's public key is the correct choice. It's the only way to ensure only she can decrypt the message.
upvoted 0 times
...
...
Shalon
10 months ago
Haha, Bob's public key? What is this, amateur hour? Of course it's Alice's public key, how else would she be able to decrypt it?
upvoted 0 times
Caren
9 months ago
It's all about encryption and decryption, Bob needs to use Alice's public key for her to decrypt the message.
upvoted 0 times
...
Kristel
9 months ago
Exactly, using Bob's public key would make no sense in this scenario.
upvoted 0 times
...
Cecil
10 months ago
Bob should use Alice's public key to encrypt the message.
upvoted 0 times
...
...
Bea
10 months ago
Hmm, I was thinking Bob's private key, but now I'm second-guessing myself. Maybe I need to revisit the basics of asymmetric crypto.
upvoted 0 times
...
Freeman
11 months ago
I think it's Alice's public key, that's how asymmetric encryption works, right? Gotta keep those private keys private!
upvoted 0 times
Carmelina
9 months ago
It's important to understand the role of public and private keys in asymmetric cryptography to keep communications secure.
upvoted 0 times
...
Jutta
10 months ago
Exactly, Bob's private key should never be shared for security reasons.
upvoted 0 times
...
Mirta
10 months ago
That's right, using Alice's public key ensures that only she can decrypt the message with her private key.
upvoted 0 times
...
Golda
10 months ago
Yes, you're correct! Bob should use Alice's public key to encrypt the message.
upvoted 0 times
...
...
Lettie
11 months ago
No, because only I have the corresponding private key to decrypt it.
upvoted 0 times
...
Tegan
11 months ago
But wouldn't that mean anyone with my public key could decrypt it?
upvoted 0 times
...
Lettie
11 months ago
I think Bob should use my public key to encrypt the message.
upvoted 0 times
...

Save Cancel