When Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message?
a. Bob’s public key
b. Alice’s public key
c. Bob’s private key
d. Alice’s private key
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here