answersLogoWhite

0


Best Answer

John would use Jim's public key to encrypt and Jim would use his private key to decrypt.

Public Key Cryptography (Asymmetric encryption)

  • An algorithm where data encrypted with a public key can only be decrypted by the matching private key. Vice versa is true, what is encrypted with a private key can only be decrypted with a public key.
User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

John would use Jim's public key to encrypt and Jim would use his private key to decrypt.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Utilizing Public Key Encryption How would John and Jim send an encrypted message between parties?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Cryptography In terms of encryption and decryption?

In cryptography the message is encrypted by the sender and decrypted by the reciver. so, it ensures message security.


What is the difference between link and end-to-end encryption?

There is a difference between link encryption and end-to-end encryption in that link encryption encrypts and decrypts all traffic at each end of a communication line whereas with end-to-end encryption the message is encrypted by the sender at the point of origin and only decrypted by the intended reader


Why does encrypted data often look like gibberish to unauthorized users?

The purpose of encryption is to make a message/data unreadable to someone who does not have the key to decrypt it, so it is highly likely that encrypted data will appear to be gibberish.


What is an encrypted message called?

Ciphertext is another name for Encrypted


How can i convert decrypt code into ordinary language?

There is no simple answer to this question. Each encoding or encryption will have an associated decoding/decryption. In order to figure out the original message you need to at least know how it was encoded. If it was encrypted, then you will likely also need additional information such as encryption keys.


Which is an example of private key encryption?

Sending an encrypted message while other party has the (same) private key to decrypt the message. The trouble is how to transmit the key safely first. Usually there's a third party involved with a public key.


What is the application of encryption?

Cryptography is used to ensure message security during transmission. An example is the use of codes to hide your identity and transaction details when purchasing goods over the internet via you credit card.


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


How does asymmetric encryption provide confidentiality?

Asymmetric encryption can provide confidentiality in two ways:1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:User A sends a challenge message to user B which is encrypted with user B's public key to initiate secure communications.User B decrypts the message and sends the correct response back to user A encrypted with user A's public keyThe two users are now authenticated to each otherAt this point A can send a proposed symmetric key to B encrypted with B's private keyAll further communications are encrypted via the shared symmetric keyIn this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.


What is a secure encryption?

Encryption is a process of translating a message from the Plaintext, into an encoded message, called the Ciphertext. This is usually accomplished using a secret Encryption Key and a cryptographic Cipher. ss of translating a message, called the Plaintext, into an encoded message, called the Ciphertext. This is usually accomplished using a secret Encryption Key and a cryptographic Cipher.


Which method of encryption inserts characters between existing characters?

Transposition cipher is a method of encryption that reshuffles the order of characters without changing them, often inserting characters between existing characters to hide the message. This technique does not change the characters themselves, only their positions within the message.


What is Plaintext?

Plaintext is easily readable or, to be more accurate, decrypted/unencrypted text. This is opposed to ciphertext, which is encrypted. If you used an encryption algorithm to encode your message of "Hello, there" to "4hgu28fhdjf83291". The plaintext form would be: "Hello, there" The ciphertext form would be: "4hgu28fhdjf83291"