1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
12

You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the

â message?
a. you need the decryption algorithm to decrypt the message so you can read it.

b. you need the encryption algorithm so you can decrypt the message and read it.

c. you need the key it was encrypted with to decrypt it so you can read the message.

d. you need the public key so you can decrypt the message and read it.

e. you need the private key to decrypt the message so you can read it.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
5 0
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
You might be interested in
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
1. Data in a smart card can be erased
Ostrovityanka [42]

Answer:

false

true

false

true

true

5 0
3 years ago
Read 2 more answers
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores,
riadik2000 [5.3K]

Answer:

Skimming

Explanation:

7 0
3 years ago
Read 2 more answers
Engine coolant does all of the following except
Amiraneli [1.4K]
D prevent the formation of rust
8 0
3 years ago
Read 2 more answers
PLEASE HELP ILL GIVE BRAINLIEST
jeyben [28]

Answer:

text labels and different

Explanation:

4 0
3 years ago
Other questions:
  • Question 2 (1 point)
    9·1 answer
  • A method's name and parameter list constitute the method's ____.
    13·1 answer
  • Which statement is true about customizing presentation programs? A. You can add multiple animations to an object in a slide with
    14·2 answers
  • Subscript numbering always starts at what value?
    14·1 answer
  • What is a feature of Print Preview? Fit to Document Fit to Margin Fit to Page Fit to Size
    5·2 answers
  • Create the code that will find
    11·1 answer
  • BIE, but plz help me on this ASAP!!! GIVING A BRAINLIEST... For this activity, imagine that you have been asked to teach a frien
    8·1 answer
  • Mention one application of AI from the real world and describe the use of of this application what is the type of learning used
    11·1 answer
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!