1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
12

You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the

â message?
a. you need the decryption algorithm to decrypt the message so you can read it.

b. you need the encryption algorithm so you can decrypt the message and read it.

c. you need the key it was encrypted with to decrypt it so you can read the message.

d. you need the public key so you can decrypt the message and read it.

e. you need the private key to decrypt the message so you can read it.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
5 0
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
You might be interested in
Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
LuckyWell [14K]

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

7 0
3 years ago
Read 2 more answers
How dose society use computer in government?​
SCORPION-xisa [38]

Answer:

Like businesses, state and federal government offices use computers. Government employees must set up meetings and distribute various reports. ... Computer uses in government offices also include various e-mail functions, payment distribution, record keeping and even coordinating mailings.

Explanation:

8 0
2 years ago
You may nest while and do-while loops, but you may not nest for loops<br><br><br><br> True False
morpeh [17]

Answer:

You may nest while and do-while loops, but you may not nest for loops - False

4 0
2 years ago
Write a program that accepts any number of scores ranging from 0 to 10
Likurg_2 [28]

Answer:

I think it's 5,6,3,8,4

8 0
3 years ago
Note: the println() function prints out a line of text with the value that you pass to it - so if you say println("Hi"), it will
Paul [167]

The answer to this is 9choice B) or hi  hi

hope this is helpful

8 0
3 years ago
Other questions:
  • If you delete a sent message on gmail does the person still get it
    14·1 answer
  • A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ___
    14·1 answer
  • The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
    5·1 answer
  • (Financial application: compound value) Suppose you save $100 each month into a savings account with the annual interest rate 5%
    8·1 answer
  • A library function that can find one string inside another is:
    9·1 answer
  • IOS jail broken or Android unrooted which is better to hack with
    6·1 answer
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • Why is an increase in tax rate not necessarily increase government revenue​
    10·1 answer
  • La estructura basica de una pagina web en Html​
    11·1 answer
  • Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!