Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-81 Topic 2 Question 30 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 30
Topic #: 2
[All 212-81 Questions]

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Show Suggested Answer Hide Answer
Suggested Answer: D

Vigenre

https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

The Vigenre cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

First described by Giovan Battista Bellaso in 1553, the cipher is easy to understand and implement, but it resisted all attempts to break it until 1863, three centuries later. This earned it the description le chiffre indchiffrable (French for 'the indecipherable cipher'). Many people have tried to implement encryption schemes that are essentially Vigenre ciphers. In 1863, Friedrich Kasiski was the first to publish a general method of deciphering Vigenre ciphers.


Contribute your Thoughts:

Fernanda
1 months ago
I'm going with C, Alice's public key. Anything else would just be a recipe for disaster, like sending a message to myself and wondering why nobody can read it.
upvoted 0 times
Anjelica
10 days ago
A) Alice's public key is the correct choice. It's the only way to ensure only she can decrypt the message.
upvoted 0 times
...
...
Shalon
1 months ago
Haha, Bob's public key? What is this, amateur hour? Of course it's Alice's public key, how else would she be able to decrypt it?
upvoted 0 times
Kristel
17 days ago
Exactly, using Bob's public key would make no sense in this scenario.
upvoted 0 times
...
Cecil
28 days ago
Bob should use Alice's public key to encrypt the message.
upvoted 0 times
...
...
Bea
1 months ago
Hmm, I was thinking Bob's private key, but now I'm second-guessing myself. Maybe I need to revisit the basics of asymmetric crypto.
upvoted 0 times
...
Freeman
2 months ago
I think it's Alice's public key, that's how asymmetric encryption works, right? Gotta keep those private keys private!
upvoted 0 times
Carmelina
21 days ago
It's important to understand the role of public and private keys in asymmetric cryptography to keep communications secure.
upvoted 0 times
...
Jutta
28 days ago
Exactly, Bob's private key should never be shared for security reasons.
upvoted 0 times
...
Mirta
1 months ago
That's right, using Alice's public key ensures that only she can decrypt the message with her private key.
upvoted 0 times
...
Golda
1 months ago
Yes, you're correct! Bob should use Alice's public key to encrypt the message.
upvoted 0 times
...
...
Lettie
2 months ago
No, because only I have the corresponding private key to decrypt it.
upvoted 0 times
...
Tegan
2 months ago
But wouldn't that mean anyone with my public key could decrypt it?
upvoted 0 times
...
Lettie
2 months ago
I think Bob should use my public key to encrypt the message.
upvoted 0 times
...

Save Cancel