Bob sends Alice an encrypted message using RSA. What key would Alice need to use to decrypt the message?
A. Public key
B. Private key
C. Shared key
D. The same key that Bob used to encrypt the message
Answer: B
Explanation: RSA is an asymmetric/public key encryption protocol. In asymmetric encryption uses two keys: A message is encrypted with a public key and then decrypted with the private key.
You might also like to view...
Convert the C program in the power.c file (Section 9.4.2) into C++. sore the pre-standard, post standard without namespaces and post standard with namespaces versions of the program in the files named power1.cpp power2.cpp power3.cpp. Generate the executable code for the three files and store the code in power1 power2 and power3 files respectively. Then run the three programs to see if they all work. Write down the sequence of commands.
First of all, the source code needs to be edited to generate the code for the three versions of the program. Any editor such as vim or vi can be used for this purpose. To compile the code instead of the gcc compiler, g++ compiler is used.
Press [Alt] [Backspace] (Win) or ____ (Mac) to fill a selection with the foreground color.
A. [option] [Delete] B. [Shift] [option] C. [Delete] [Shift] D. [Control] [option]
A 3D model is defined in an Ogre ________ file.
Fill in the blank(s) with the appropriate word(s).
In quicksort, all the sorting work is done in ____ the list.
A. partitioning B. combining C. duplicating D. replicating