Which of the following is true of public key encryption?
A) The encryption formulas used for creating the keys are simple in nature and identical at both ends.
B) The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.
C) The private key is used for encryption and is known only to the sender, while the public key is freely distributed among everyone and is used for decryption.
D) The public key encryption scheme uses a single key to encrypt data that can later be decrypted by using the encrypted data as the key.
B
You might also like to view...
Which leadership theories discussed in the text have “intuitive appeal” as a key strength?
A. behavioral, transformational, situational B. trait, behavioral, path-goal C. path-goal, situational, trait D. trait, skills, transformational
Explain the controversy surrounding cause-related marketing
What will be an ideal response?
Talking headings are preferred in business reports because they tell about the content of the sections and reveal any conclusion(s) presented in the sections
Indicate whether the statement is true or false
Quantity of output, absenteeism, tardiness, turnover, and other measurable outcomes are considered to be:
a. Personal behavior outcomes b. Objective outcomes c. Intrinsic and extrinsic outcomes d. Job satisfaction outcomes