With ______________ encryption, one key is used to encrypt a message, and another is used to decrypt the message

a. Private key
b. Public key
c. Cipher
d. None of the above


Answer B. You can freely distribute your public key so that anyone can encrypt a message sent to you, but only you have the private key and only you can decrypt the message.

Computer Science & Information Technology

You might also like to view...

If Americans are objects of the same class, which of the following attributes would most likely be represented by a static variable of that class?

a. Age. b. The President. c. Place of birth. d. Favorite food.

Computer Science & Information Technology

In addition to adjusting magnification on the Stage using the View list arrow in the Document window, you can use the ____________________ Tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Function call overhead is justified because it can reduce a program's ____________________ substantially.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.

A. pool B. type C. valence D. domain

Computer Science & Information Technology