1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
12

You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the

â message?
a. you need the decryption algorithm to decrypt the message so you can read it.

b. you need the encryption algorithm so you can decrypt the message and read it.

c. you need the key it was encrypted with to decrypt it so you can read the message.

d. you need the public key so you can decrypt the message and read it.

e. you need the private key to decrypt the message so you can read it.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
5 0
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
You might be interested in
I’ll give brainliest if answers are correct
irina [24]

Answer:

B and C

Explanation:

A download playback is more reliable because it's stored on the device you're using so there won't be any skipping in during the song.

And it's more portable because you don't need the internet so you can play it anywhere.

It's not D because you still have to wait for it to download before you can play it

Not E because it takes storage on your phone

Not A because the answer for A is a point for streaming

7 0
3 years ago
Design a module named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prom
Sergeu [11.5K]

Explanation:

Module getNumber (Integer Ref Value)

Display "Display a number"

Input number

End module

Module main ()

Declare Integer number x = 1

Declare Real number y = 2.5

Display( x, " " ,y)

Call changeUS (x,y)

Display( x, " " ,y)

End module

5 0
3 years ago
List three types of cardinalities for relationships within a relational database.
Afina-wow [57]
This is about identifiers in a record referring to other records.
You can have many to one, one to one, many to many.

E.g., if you have two tables, Authors and Books, then a book record could have a reference to an author record. Since an author can write many books, this would be a many-to-one relationship.


3 0
3 years ago
A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
o-na [289]

Answer:

Identity Theft. i hope this helps :D

5 0
3 years ago
What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
defon
A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program<span> that gets the requests from clients and seeks resources from other </span>servers. It is a <span>intermediary point between the end user and the backbone network.</span>
8 0
3 years ago
Other questions:
  • 3. Discuss the disadvantages of file-based systems.
    13·1 answer
  • Explain what a dam is and what it does
    12·1 answer
  • Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
    13·2 answers
  • Emotional intelligence is a new term to describe personal traits ?
    12·1 answer
  • Stating a document is PDF or XPS document refers to document _______​
    10·1 answer
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • Always follow the routine "clean up while in use and clean up before keeping it".
    6·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is inst
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!