Question

1.    If Nancy receives an encrypted message from Matthew, which key does she use to read...

1.    If Nancy receives an encrypted message from Matthew, which key does she use to read it?
2.    What is a keyring?
3.    Which commands are used to display all of the keys in a user’s keyring?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

SOLUTION-

1) In this case she have to use "her private key"(i.e, Nancy's private key) . using her private key , she can decrypt and read the message and only sge can access that message.

2) "keyring" is nothing but a file which contains keys recognized by a user's GnuPG install

There is a keyring for Public keys and another keyring for private keys

3) Command used to display the public keys in user's keyring:

"gpg --list-keys"

command used to display the private keys in user's keyring:

"gpg --list-secret-keys"

These two keys which are used to display all of the keys in a user's keyring

IF YOU HAVE ANY DOUBT PLEASE COMMENT DOWN BELOW I WILL SOLVE IT FOR YOU:)
----------------PLEASE RATE THE ANSWER-----------THANK YOU!!!!!!!!----------

Add a comment
Know the answer?
Add Answer to:
1.    If Nancy receives an encrypted message from Matthew, which key does she use to read...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. In a scenario where Nancy and Matthew are using public key encryption, which keys will...

    1. In a scenario where Nancy and Matthew are using public key encryption, which keys will Matthew have the ability to see in his public keyring (--list-keys)? 2.    If Nancy wishes to send a message to Matthew, which key does she use to encrypt the message? 3.    If Matthew receives an encrypted message from Nancy, which key does he use to read it?   4.    If Matthew wishes to send a message to Nancy, which key does he use to encrypt...

  • Bob wants to send an encrypted message using public key cryptography to Alice. What key does...

    Bob wants to send an encrypted message using public key cryptography to Alice. What key does he use for encryption? You need to be explicit whose key it is and what kind of key it is. 1 AB I

  • Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings...

    Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...

  • C++ Program, Decode a Secret Message.

    Your country is at war and your enemies are using a secret code to communicate with each other.You have managed to intercept a message that reads asfollows::mmZdxZmx]ZpgyThe message is obviously encrypted using the enemy's secret code.You have just learned that their encryption method is based upon the ASCII code.Appendix 3 of your book shows the ACII character set.Individual characters in a string are encoded using this system. For example, the letter "A" isencoded using the number 65 and "B" is...

  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob....

    Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob. In order to verify the signature, Alice does the following: Hashes the received message using the same hash algorithm that Bob used, that's your calculated hash Decrypts the signature using the public key contained in the certificate, that your decrypted hash Compares the calculated hash and the decrypted hash Because the 2 hashes are identical, Alice goes on and: Checks the validity period on...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B:...

    secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT