Question
Which of the following is the most effective method to
ensure data confidentiality when transmitting sensitive information over a public network?Solution
Public-key encryption using the recipient’s public key is the best choice for ensuring data confidentiality during transmission. This method leverages asymmetric encryption, where the recipient’s public key is used to encrypt the data, and only the recipient can decrypt it using their private key. This ensures that even if the data is intercepted during transmission, it cannot be read by unauthorized parties without access to the recipient's private key. For example, when a user sends an email encrypted with the recipient's public key, only the recipient can decrypt it, preserving confidentiality. Asymmetric encryption also avoids the risk of key compromise associated with pre-shared keys in symmetric encryption. Moreover, it scales better for secure communication across multiple parties because each participant needs only one pair of keys (public and private) instead of maintaining numerous shared keys. Why Other Options Are Incorrect:
- A) Symmetric encryption relies on a shared secret key. If the key is intercepted, the data is compromised.
- B) Using the sender’s private key ensures authenticity but does not protect confidentiality because anyone with the sender’s public key can decrypt the data.
- D) Hashing only ensures data integrity, not confidentiality, as it does not allow for data reconstruction or encryption.
- E) A one-time pad is secure in theory, but improper key management makes it impractical for real-world applications.
Which of the following is not in the Top five most populous countries?
Match the animals in column A with the phylum they belong to in column B
Which of the following is India's largest underground pipeline?
Tanya gives away to each of four girls 1/12, 5/18, 7/30, 7/48 of the apples in a basket and has only just enough apples to be able to do so without divi...
Where was the 'National Conference on Accelerating Sustainable Development Goals' organized by NITI Aayog in partnership with the Government of Rajastha...
Identify whether the following statements are correct or incorrect.
Statement 1: According to the Census of India-2011, among the Seven Sister St...
Third Battle of Panipat was held in which year?Â
What is the objective of the Production Linked Incentive (PLI) Scheme for Automobiles and Auto Components introduced by the Ministry of Heavy Industries?
What is the maximum amount a payment bank should maintain at the end of the day as per the KYC – Know Your Customer complaint PPIs?
Who was the President of the Indian National Congress during the visit of the Simon Commission to India?