Which of the following BEST describes the process of creating a digital envelope?
A.
The encryption key is compressed within a folder after a message is encoded using symmetric encryption.
B.
A message is encoded using symmetric encryption, and then the encryption key is secured using public key encryption.
C.
The message is hashed, and the hash total is sent using symmetric encryption.
D.
A message digest is encrypted using asymmetric encryption, and the encryption key is sent using asymmetric encryption.
The Answer Is:
B
This question includes an explanation.
Explanation:
A digital envelope combines the strengths of symmetric and asymmetric cryptography. The message itself is encrypted using a fast symmetric algorithm. The session key used for symmetric encryption is then encrypted using the recipient’s public key. This ensures efficiency (large data encrypted quickly with symmetric keys) and security (session key securely transmitted using asymmetric encryption). Options A, C, and D describe other cryptographic processes (compression, hashing, or digital signatures) but do not correctly represent a digital envelope. ISACA training materials and CISA manuals highlight this hybrid approach as the standard method for secure data transmission.