Enhance your readiness for the AP Computer Science exam with insightful quizzes. Deepen your understanding and master key concepts as you prepare for a successful test experience!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


In the context of public key cryptography, what does Bob do when sending sensitive data to Alice?

  1. He encrypts it with his own Private Key.

  2. He encrypts it with Alice's Public Key.

  3. He sends it without encryption.

  4. He encrypts it with a shared secret key.

The correct answer is: He encrypts it with Alice's Public Key.

When Bob sends sensitive data to Alice in the context of public key cryptography, he encrypts the data using Alice's public key. This method ensures that only Alice can decrypt the message because only she possesses the corresponding private key that pairs with her public key. The security model of public key cryptography allows for secure data transmission over potentially insecure channels, as anyone can encrypt a message with Alice's public key, but only she can decrypt it with her private key. This mechanism effectively protects the confidentiality of the data as it travels from Bob to Alice.