Richard received a message from Matthew that was encrypted using a symmetric cryptosystem. What key should Richard use to decrypt the message?

a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key


Answer: e. Shared secret key

Computer Science & Information Technology

You might also like to view...

Given: |-56|. The __________ of this expression is 56.

Fill in the blank(s) with correct word

Computer Science & Information Technology

The table shown lists dentist/patient appointment data. A patient is given an appointment at a specific time and date with a dentist located at a particular surgery. On each day of patient appointments, a dentist is allocated to a specific surgery for that day.

What will be an ideal response?

Computer Science & Information Technology

In C++ a procedure is formally referred to as a function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) _________________________ is a business that verifies, authorizes, and processes secure credit card transactions in real time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology