Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.
widely distributed. A message encrypted with a recipient's public key cannot be decrypted by anyone except the owner of that key and the
person associated with the public key used. This is used for confidentiality. A message signed with a sender's private key can be verified by
anyone who has access to the sender's public key.
Answer options A and C are incorrect. Because of the asymmetric behavior of the keys, the secret key can encrypt a message, and anyone
with the public key can decrypt it. The distinguishing technique used in public key-private key cryptography is the use of asymmetric key
algorithms because the key used to encrypt a message is not the same as the key used to decrypt it.
Garry
4 months agoLai
4 months agoTammy
4 months agoYuette
4 months agoJudy
4 months agoTamekia
5 months agoRolland
5 months agoDalene
5 months agoAilene
5 months agoCelestina
5 months agoMari
5 months agoTyra
5 months agoDallas
5 months ago