John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?
John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?
To send an encrypted email using PGP (Pretty Good Privacy), John should use Marie's public key to encrypt the message. Public-key cryptography allows anyone to encrypt a message using the recipient's public key, but only the recipient can decrypt it using their private key. This ensures that only Marie can read the sensitive information John is sending.
D. Use Marie’s public key to encrypt the message. Explanation: PGP (Pretty Good Privacy) is an encryption software that can be used to encrypt and decrypt electronic communications, such as emails. PGP uses a combination of symmetric-key and public-key encryption to provide confidentiality and authenticity to the communications.
public key to encrypt the message Priv. key to crypt message and Priv.Key to signg msg and to Pub.Key to verify
D. Use Marie’s public key to encrypt the message.
See more at CEH book v12 - Module 20 Page 3399
D. Use Marie’s public key to encrypt the message.
D. Use Marie’s public key to encrypt the message.
Use Marie’s public key to encrypt the message