Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer: word processing
hope this helps :)
Air bags are always safe. A. True<u> B. False</u>
Answer:
the answer is A, B, C hope this helps.
So you are gonna read that whole paragraph and then answer the question or describe what you learned about