If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

A. Alice's private key
B. Bob's public key
C. Alice's public key
D. Bob's private key


C. Alice's public key

Computer Science & Information Technology

You might also like to view...

The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ task pane provides access to information typically found in references such as dictionaries, thesauruses, and encyclopedias.

A. Research B. Resource C. Library D. Reference

Computer Science & Information Technology

You can add a ____ to an image to change how pixels in the selected layer blend with pixels in the same location in the layer just below it

a. smart filter b. blending mode c. dock d. color gamut

Computer Science & Information Technology

The set of moral principles that govern people's behavior is called ____. 

A. plagarism B. ethics C. fair use doctrine D. public domain

Computer Science & Information Technology