1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
12

You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the

â message?
a. you need the decryption algorithm to decrypt the message so you can read it.

b. you need the encryption algorithm so you can decrypt the message and read it.

c. you need the key it was encrypted with to decrypt it so you can read the message.

d. you need the public key so you can decrypt the message and read it.

e. you need the private key to decrypt the message so you can read it.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
5 0
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
You might be interested in
What is the purpose of filters in a database?
malfutka [58]

Answer:

A: Filters allow you to see only the records that meet specific criteria.

Explanation:

Imagine you having a database full of first and last names. You could use a filter to only show the people who have a specific first or last name.

6 0
4 years ago
According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g
Nat2105 [25]

Answer:

According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g., items for​ sale), but a

C. database

is better for managing information about more than one thing​ (e.g., items for sale and suppliers of​ items).

Explanation:

  • The option A is not correct as the flowchart is a step-by-step explanation of a procedure. It is visual presentation in which we explain a whole process.
  • The  option B is not correct as network is defined as the group of different computers, servers and other machines that helps the exchange of data.
  • The option c is correct as database is the means of storage of data as well as we can access this data at any time and it let you manage the data as well so we can manage a lot of information about multiple things at a time.
  • The option d is also incorrect as workflow is the visual presentation of sequence in which tasks are performed so it doesn't have to do anything wit the managing the information.
  • The option e is also incorrect as data model defines the properties of data of different things and it is used in database. It sets the rule of storing, managing and accessing the data in a database.
7 0
3 years ago
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
Pavel [41]
They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures
4 0
2 years ago
A) Explain the concept of memory management unit as related to Operating systems.
USPshnik [31]

Answer:

Memory is the faculty of the brain by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action.

Explanation:

4 0
3 years ago
Stores of data that are so vast that conventional database management systems cannot handle them, and very sophisticated analysi
Colt1911 [192]
Maybe an international database, where all nations are invited to contribute information, THEREFORE, there would be a vast amount of data.
5 0
3 years ago
Other questions:
  • This formatting option functions like a space bar. However, instead of moving one space at a time, it allows you to move your te
    6·1 answer
  • You learned about microcomputer a personal computer designed for use by an individual. Perform online research find out the diff
    12·1 answer
  • Find functions f1 and f2 such that both f1 and f2 are O(g(n)), but f1(n) is not O(f2)
    6·1 answer
  • How many unique ip addresses can be made in a fixed-length ip address system using 6 bits?
    8·1 answer
  • Yolanda is writing a document that will provide configuration information regarding the minimum level of security that every sys
    5·1 answer
  • . When a system isdelivered over time, with each delivery (release) adding tothe
    5·1 answer
  • Anyone know how to do point hack​
    9·2 answers
  • Indicates the beginning and ending of your code written in HTML
    12·1 answer
  • Which of the following binary numbers is equivalent to decimal 4?
    8·2 answers
  • guys look at this https://brainly.com/app/profile/17971193/answers i need help and tips to get this cute girl to give me her num
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!