Start learning 50% faster. Sign in now
Get Started with ixamBee
Start learning 50% faster. Sign in nowPublic-key encryption using the recipient’s public key is the best choice for ensuring data confidentiality during transmission. This method leverages asymmetric encryption, where the recipient’s public key is used to encrypt the data, and only the recipient can decrypt it using their private key. This ensures that even if the data is intercepted during transmission, it cannot be read by unauthorized parties without access to the recipient's private key. For example, when a user sends an email encrypted with the recipient's public key, only the recipient can decrypt it, preserving confidentiality. Asymmetric encryption also avoids the risk of key compromise associated with pre-shared keys in symmetric encryption. Moreover, it scales better for secure communication across multiple parties because each participant needs only one pair of keys (public and private) instead of maintaining numerous shared keys. Why Other Options Are Incorrect:
Consider the following statements in relation to GI tags:
1. Lanjia Saura paintings, Dongaria Kondh shawl, Khajuri Guda received GI tags in Jan 2...
Who has been appointed as the new Chairman of UPSC?
Who wrote the Indian national anthem, "Jana Gana Mana"?
Which Green reserve has topped the MEE (Management Effectiveness Evaluation) Index among the evaluated reserves in India?