answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Can a subscriber share his private signing key with?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

How many keys are required for two people to communication via a cipher?

That depends on whether you use a symmetric (shared key) or asymmetric (public/private key pair) algorithm. If you use a symmetric key, it means both people have the same key which has been pre-shared via some secure means. In that case, only one key is required; both parties in the communication use the same key to encrypt and decrypt all messages. If you use an asymmetric key algorithm, it takes at least 4 keys total: when sending a message each user will encrypt their message with the public key of the recipient (that accounts for two of the keys). Each recipient must then use their private key to decrypt the messages they receive (which accounts for the other two required keys).


Does the National Response Framework mandate that the private sector entities responsible for critical infrastructure and key resources must develop and exercise contingency plans?

yes


Where is the Shift key on a BlackBerry?

the alt key


Why is it important to increase market share?

It's important to increase market share because you are taking your competitors' customers and making them your own, you are also bringing in more money for the business and have the bragging rights that you are the best-seller in that industry.


How do you use the hash key on a BlackBerry Curve during a call?

you press the 2 arrows on the key board then press the key with the hash on To enter the Hash Key you need to press the sym key followed by the letter Q during a call instead of the usual alt key followed by Q :o)

Related questions

Is it necessary to escrow or back up a user's signing key?

no - to create a safe network, users' signing keys must be unique and private


Difference between public and private key?

Examples of a private organisation: McDonalds, Topshop, The Trafford Centre. It is an organisation that is owned privatly by someone and who has to sell a product or provide a service to make their money. Examples of a public organisation: The police, The Fire service. It is an organisation owned by the government to help the public, it is not owned privately.


What are the examples of public and private key?

example for the private and public key


What are the roles of Public and Private Key?

A user's private key is kept private and known only to the user. The user's public key is made available to others to use. The private key can be used to encrypt a signature that can be verified by anyone with the public key. Or the public key can be used to encrypt information that can only be decrypted by the possessor of the private key


What is the file extension used by default for a certificate file that does not contain a private key?

.cer for file without private key, .pfx for file with private key


What is the file extension used by default for a certifcate file that contains the private key?

*.pfx contains the private key and *.cer does not contain the private key


Is Kerberos a private key encryption?

Kerberos is an example of a private key encryption service.


In asymmetric encryption Both the sender and receiver have a private key and a shared private key?

No, both sender and receiver have a private key and a public key. It works like this: if you encrypt something with one key, you need the other to decrypt it. You give everyone a copy of your public key. When they want to send you something encrypted, they use your public key to send it. Only your private key can decrypt it, so no one else can read it. You don't give out your private key.


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


With what do we associate the term public key and private key?

The public key is associated with a key that is used in an entire program while a private key is only used within a function.


What uses a single key to encrypt and decrypt?

Private Key


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.