Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 329 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 329
Topic #: 1
[All 312-50v11 Questions]

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography.
What key does Bob use to encrypt the checksum for accomplishing this goal?

  • A. Alice's public key
  • B. His own public key
  • C. His own private key
  • D. Alice's private key
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lawbut2
Highly Voted 2 years, 5 months ago
Correct. C. His own private key. Page 3065, CEH v11 "Sender sends hash code using his PRIVATE key"
upvoted 19 times
...
micka69
Highly Voted 2 years, 5 months ago
Asymmetric Encryption uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption. As implied in the name, the Private Key is intended to be private so that only the authenticated recipient can decrypt the message.
upvoted 13 times
Brian_Tseng
2 years, 2 months ago
So... What is the answer?
upvoted 2 times
KumaraRashu
2 years, 2 months ago
Ans is A:Page 3020 CEHv11
upvoted 5 times
...
...
...
Spam_Protection
Most Recent 1 month, 1 week ago
Selected Answer: A
Encryption. Not signing
upvoted 1 times
...
YourFriendlyNeighborhoodSpider
5 months, 1 week ago
Selected Answer: A
ChatGPT answer: Correct answer: A. Alice's public key Explanation: Bob wants to ensure that Alice can check whether his message has been tampered with. To achieve this, he encrypts the checksum of the message using asymmetric cryptography. In asymmetric cryptography, there are two keys: a public key and a private key. The public key is used for encryption, and the private key is used for decryption. Bob uses Alice's public key for encryption: Bob wants Alice to be able to decrypt and verify the checksum. In asymmetric cryptography, anything encrypted with the public key can only be decrypted with the corresponding private key. Therefore, by encrypting the checksum with Alice's public key, only Alice (who possesses the corresponding private key) can decrypt and verify it.
upvoted 3 times
...
sudowhoami
5 months, 1 week ago
Selected Answer: A
A is the correct choice. He uses Alice's public key to encrypt the message and Alice use her own private key to decrypt the message.
upvoted 1 times
...
12787
6 months, 1 week ago
Bob uses Alice's public key to encrypt the checksum. This is a common practice in asymmetric cryptography. Bob uses Alice's public key for encryption because only Alice, with access to the corresponding private key, can decrypt the message. This ensures that only Alice can verify the integrity of the message by decrypting the checksum and comparing it to a newly calculated checksum of the received message. Using Alice's public key for encryption adds an extra layer of security to ensure that the checksum is only accessible to the intended recipient.
upvoted 1 times
...
Vincent_Lu
6 months, 1 week ago
Selected Answer: C
His own private key
upvoted 1 times
12787
6 months, 1 week ago
In asymmetric you use the public key to encrypt the message then the recipiant uses their own private key to deycrypt.
upvoted 1 times
...
...
Buksi
10 months, 1 week ago
Encrypt the message -> Alice's public key Encrypt the checksum -> His own private key
upvoted 2 times
...
akailah88
11 months ago
Selected Answer: C
Simply put, what is required is to ensure that the message has not been tampered with. What is correct is that the message is signed by the sender, which is bob by its public key. Method a is confidential, that is, the message can only be opened by the recipient. If the answer is C
upvoted 1 times
...
victorfs
11 months ago
Selected Answer: A
The correct opción is A.
upvoted 2 times
...
victorfs
11 months ago
Selected Answer: C
The correct option is C C. His own private key
upvoted 1 times
victorfs
11 months ago
No really... I think is A, becausw you use your private key foro sign a message (digital signature), but you use the public key of the destinatary for encrypt the message! In this case i think IS similar, so the correct option is A. Finally.
upvoted 1 times
...
...
victorfs
11 months, 1 week ago
Selected Answer: A
The correcto option is A. Alice's public key. If you choose the C, Alice can't read the message!
upvoted 3 times
victorfs
11 months ago
Alice should have your public key, bob
upvoted 1 times
victorfs
11 months ago
To the end, the correct option is A. Remember!
upvoted 1 times
...
...
victorfs
11 months ago
No really.. the option C could be correct too.
upvoted 1 times
victorfs
11 months ago
To the end the correct option is A
upvoted 1 times
...
...
...
MGRavindra
1 year, 1 month ago
Bob will digitally sign the message using his private key. Bob will encrypt the message using Alice's public key - So only Alice can decrypt the message. The question talks about encryption. Hence Answer is A - Alice's public key
upvoted 5 times
...
Shin_Frankie
1 year, 2 months ago
Selected Answer: C
ambigious question, if use PGP is A, not is C
upvoted 1 times
...
VOAKDO
1 year, 3 months ago
A. Sign a message: sender's privatek-> senders's publick encrip. a message: receiver's publick-> receivers's private Here are "encripting", they never say "sign".
upvoted 2 times
...
jasonkym
1 year, 3 months ago
Selected Answer: A
The answer is A, Creating a checksum of a message does not equate to signing it. Bob just want Alice to be able to check if the message is has been tampered with. He does not want to sign it to proof that he is the sender of the message.
upvoted 2 times
...
Acidscars
1 year, 3 months ago
Selected Answer: C
I think the question is inferring NonRepudiation over Confidentiality. The question states "check whether his message has been tampered with". Anyone can encrypt with Alice's public key and impersonate Bob so although that method would ensure full confidentiality, it could not verify it was actually his message being sent. Encrypting using his private key ensures that it was actually sent by him, although anyone would be able to be decrypt it using his public key, not just Alice. The question doesn't mention this as being a requirement though. The only way to ensure the message was sent by him and not tampered with is by encrypting using his private key.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...