Which of the following is true about asymmetric cryptography?

A. the private key can be used to encrypt and decrypt a message
B. a shared key is used to encrypt all messages and the private key decrypts them
C. a single key is used and is transferred using a key management system
D. the public key is used to encrypt a message sent to the private key owner


Answer: D

Computer Science & Information Technology

You might also like to view...

What is the purpose of coding the algorithm into instructions written in a programming language?

A. It allows the computer to implement it. B. It helps integrate the circuits. C. It forces the user to learn a new programming language. D. It instructs the computer on what not to do.

Computer Science & Information Technology

In the figure above, item 1 shows you where to create a(n) ____.

A. custom library B. Manage library icon C. library folder D. "real" location

Computer Science & Information Technology

A paragraph-ending line that appears by itself at the top of a page is called a(n) ________

A) endnote B) widow C) footnote D) orphan

Computer Science & Information Technology

How does a RADIUS server respond to an authentication request from a supplicant?

What will be an ideal response?

Computer Science & Information Technology