If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?

A. Bob's private key.
B. Alice's private key.
C. Bob and Alice's keys.
D. Bob's private key and Alice's public key.


Answer: A

Computer Science & Information Technology

You might also like to view...

In a recursive power function that calculates some base to the exp power, what is the recursive call?

What will be an ideal response?

Computer Science & Information Technology

The methods of __________ conceal the existence of the message in a graphic image.

A) steganography B) decryptology C) cryptology D) cryptography

Computer Science & Information Technology

Each parameter in a function header specifies both a(n) ______________ and a(n) ______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The amount of RAM storage is measured in ________

A) MHz B) GHz C) GB D) Hz

Computer Science & Information Technology