If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp t the message?
1 answer:
Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
You might be interested in
Manual power hope it helps you
Explanation:
output device
louder volume
Answer:
area = 2.14 * 3 ** 2
Explanation:
No clue what language you use but this should be pretty universal. To find the area of a circle you use pi(r) ^ 2 or pi times radius squared
In python it looks like this:
>>> area = 3.14 * 3 ** 2
>>> print(area)
28.26<em> <Printed text</em>
Answer:
Ctrl + D used to duplicate a slide
Answer:
I am not for sure on this, but yes I think it is possible for the PowerPoint user to add notes to slides and see the added comments. If it isn't possible I know for a fact on Google slides it is possible.
:
hope this helps! :)