1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
12

You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the

â message?
a. you need the decryption algorithm to decrypt the message so you can read it.

b. you need the encryption algorithm so you can decrypt the message and read it.

c. you need the key it was encrypted with to decrypt it so you can read the message.

d. you need the public key so you can decrypt the message and read it.

e. you need the private key to decrypt the message so you can read it.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
5 0
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
You might be interested in
Discuss whether design considerations need to change for each kind of computer users. support your answer with an example.
vaieri [72.5K]
Each kind of computer users have different knowledge, needs and requirements. For example there is a difference between the computer knowledge of developers and users without <span>technical experience. Because of this, but also why they need and use computers, and what tools they need, design consideration need to change for each kind of computer users.</span>
<span>
</span>
8 0
3 years ago
Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?
DerKrebs [107]

Answer:

e

Explanation:

the valid sql syntax for creating table is

CREATE TABLE table_name (

column_name column_type

)

varchar and int are the valid sql types not string and integer

AS is used in select queries to aggregate results under given name

8 0
3 years ago
Please create a new java package and class file for each problem. 1. Given the current array of numbers - [0,2,85,71,44,6,8,54,5
EastWind [94]

Answer:

¿Cómo se crear un objeto de una determinada clase en Java?

Para crear un objeto de una clase se usa la palabra reservada new. Por ejemplo, Rectangulo rect1=new Rectangulo(10, 20, 40, 80); new reserva espacio en memoria para los miembros dato y devuelve una referencia que se guarda en la variable rect1 del tipo Rectangulo que denominamos ahora objeto.

Explanation:

¿Cómo pasar un objeto de una clase a otra en Java?

Para clasificar un método de otra clase, necesitamos tener el objeto de esa clase. Aquí, tenemos una clase “Student” que tiene un método getName() . Accedemos a este método desde la segunda clase SimpleTesting usando el objeto de la clase Student

8 0
2 years ago
Where is the bubble level on a tripod?
Alla [95]
It's most problems the mounting plate. Don't hold me to that but due to the logic in this question it's most probably the mounting plate
7 0
4 years ago
Read 2 more answers
4. The is the metal box that contains the main components of the computer ​
Anestetic [448]

Answer:

The computer case

Explanation:

"The computer case is the metal and plastic box that contains the main components of the computer, including the motherboard, central processing unit (CPU), and power supply. The front of the case usually has an On/Off button and one or more optical drives."

3 0
2 years ago
Other questions:
  • Which app is not a free app that your Microsoft account gives you access to
    6·1 answer
  • Which is a possible benefit of having a good credit history?
    13·2 answers
  • what is the restaurant with the black pom tree and yellow backround three letter name from hi guess the restaurant
    14·2 answers
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • What does sampling accomplish? Choose all that
    11·1 answer
  • 1. Target area range is a survey of what lies about __________ seconds ahead of the vehicle. A. 5-10 B. 10-20 C. 20-30 D. 40-50
    11·2 answers
  • How is a website most likely to distinguish its different sections?
    8·1 answer
  • Which componet is the smallest unit in a spreadsheet
    15·1 answer
  • How will Artificial Intelligence change the way we do things? .......C-Claim:
    10·1 answer
  • Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is p
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!