Which of the following does not occur when sending a message using a digital envelope?

(a) The message is encrypted using a symmetric secret key.
(b) The secret key is encrypted using public-key encryption.
(c) A courier is used to transmit the symmetric secret keys between parties.
(d) All of the above occur when sending a message using a digital envelope.


(c) A courier is used to transmit the symmetric secret keys between parties.

Computer Science & Information Technology

You might also like to view...

When deriving a class from a protected base class, the public members of the base class become _________ and the protected members of the base class become __________?

a. protected, private b. public, private c. protected, protected d. public, protected

Computer Science & Information Technology

The capabilities of inputting and outputting strings in memory are known as:

a. String i/o manipulation. b. String stream processing. c. Character handling. d. Dynamic string operations.

Computer Science & Information Technology

Theme ________ are variations of the current theme

Fill in the blank(s) with correct word

Computer Science & Information Technology

Excel can export PDF files

Indicate whether the statement is true or false

Computer Science & Information Technology