Alice has used an asymmetric cryptographic technique to encrypt data with her private key. Alice then sends the data to Bob. Bob attempts to decrypt the data using his private key and complains that he cannot decrypt the data.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here