Bob sends Alice an encrypted message using AES. What key would Alice need to use to decrypt the message?

A. Bob's public key
B. Bob's private key
C. Alice's public key
D. The same key that Bob used to encrypt the message


Answer: D
Explanation: AES is a private/symmetric key algorithm. Symmetric key encryption uses one shared key to encrypt and decrypt data, so Alice needs to use the same key Bob used to encrypt the data to decrypt the message.

Computer Science & Information Technology

You might also like to view...

A queue invariant is a condition

A) obeyed by queues that need to remain constant B) that is required to be true after the execution of each queue class method C) that is more stringent than invariants for other types of collections D)that is true regardless of the actual type used to instantiate a generic queue.

Computer Science & Information Technology

The command to delete all windows except the current window is:

a: [Alt-x] c b: [Ctrl-x] all c: [Ctrl-x][Ctrl-a] d: [Ctrl-x] a e: [Ctrl-x] 1

Computer Science & Information Technology

____________________ are used to organize the content of your document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Alice 2.2 allows you to record the view in the World window while an Alice world is playing as a QuickTime Movie file (*.mov).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology