BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 4 Question 97 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 97
Topic #: 4
[All CPEH-001 Questions]

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob's public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob's public key and use it to verify Bob's signature, they cannot discover Bob's private key and use it to forge digital signatures. What does this principle refer to?

Show Suggested Answer Hide Answer
Suggested Answer: D

PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other.


Contribute your Thoughts:

Brande
27 days ago
Asymmetry all the way! The whole beauty of public-key crypto is that the public key can be used to encrypt, but the private key is the only way to decrypt. Nicely done, test writer!
upvoted 0 times
Mabel
21 hours ago
D) Asymmetry
upvoted 0 times
...
Dannette
3 days ago
C) Symmetry
upvoted 0 times
...
Serita
8 days ago
B) Non-repudiation
upvoted 0 times
...
Krissy
12 days ago
A) Irreversibility
upvoted 0 times
...
...
Kenia
29 days ago
Haha, I love these cryptography questions. They're like little puzzles. This one's a classic example of asymmetric encryption - the public and private keys are a perfect match!
upvoted 0 times
...
Phuong
1 months ago
Ooh, tricky one! I was thinking Irreversibility at first, but then I realized that's more about the difficulty of reversing the encryption, not the key relationship. Definitely Asymmetry.
upvoted 0 times
Karan
10 days ago
Yes, the principle refers to Asymmetry in this context.
upvoted 0 times
...
Audra
12 days ago
Asymmetry is the correct answer in this case.
upvoted 0 times
...
Sherell
18 days ago
I agree, it's definitely Asymmetry.
upvoted 0 times
...
...
Barney
1 months ago
Hmm, I was kind of torn between Asymmetry and Non-repudiation, but I think Asymmetry is the best fit. The whole point is that the private key can't be derived from the public key, which is the essence of asymmetry.
upvoted 0 times
...
Lili
1 months ago
I believe the correct answer is D) Asymmetry, as only Helga can decrypt the message with his private key.
upvoted 0 times
...
Audra
2 months ago
This seems pretty straightforward. Asymmetry is the key principle behind public-key cryptography, where the public and private keys are different but mathematically related. Totally makes sense here.
upvoted 0 times
Nettie
10 days ago
D) Asymmetry
upvoted 0 times
...
Abraham
15 days ago
C) Symmetry
upvoted 0 times
...
Selma
18 days ago
B) Non-repudiation
upvoted 0 times
...
Fernanda
24 days ago
A) Irreversibility
upvoted 0 times
...
...
Ashley
2 months ago
I think the principle refers to non-repudiation.
upvoted 0 times
...
Helga
2 months ago
I agree with Ashley, it makes sense that only Helga can read the message.
upvoted 0 times
...

Save Cancel