Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
Means no matter how many processors you use, speed up never increase from 10 times.
Explanation:
If a problem of size W has a serial component Ws,then performance using parallelism:
Using Amdahl's Law:
Tp = (W - Ws )/ N + Ws
Here, Ws = .1,
W - Ws = .9
Performance Tp = (.9 / N) + .1
---------------------------------------------------------
Speed Up = 1 / ( (.9 / N) + .1)
If N -> infinity, Speed Up <= 10
Means no matter how many processors you use, speed up never increase from 10 times.
The type of service provider