Question no 26 is not option C , but option A because, In asymmetric encryption, public and private keys are mathematically paired, and they work interchangeably depending on the use case: a. For confidentiality: Data encrypted with the public key can only be decrypted with the private key. b. For authenticity and integrity: Data "signed" (encrypted) with the private key can be verified using the public key.
GIC ki descriptive topic ki video ek upload kr dijie, isse hm sab ki kaafi help ho jaegi ma'am 🙏
Question no 26 is not option C , but option A because,
In asymmetric encryption, public and private keys are mathematically paired, and they work interchangeably depending on the use case:
a. For confidentiality: Data encrypted with the public key can only be decrypted with the private key.
b. For authenticity and integrity: Data "signed" (encrypted) with the private key can be verified using the public key.