Matthew would like to send a private message to Richard using a symmetric cryptosystem. What key should Matthew use to encrypt the message?
a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key
Answer: e. Shared secret key
Computer Science & Information Technology
You might also like to view...
When you create a query, you should follow some general guidelines for query design. What are these six guidelines?
What will be an ideal response?
Computer Science & Information Technology
Inferential statistics and Descriptive statistics are the same thing.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Since the ADT heap implementation uses an array and not a linked list, the create heap operation does not need to worry about memory overflow.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Xmas Scan is a port-scan technique with FIN, URG, and PUSH flags set to send a TCP frame to a remote device.
a. true b. false
Computer Science & Information Technology