Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
The difference between science and technology can be summarized in the following manner:
Science is more or less a study of a particular branch namely, physics, chemistry or biology. ...
Science involves observation and experimentation whereas technology involves invention and production.
Science is all about analysis whereas technology is more concerned about the synthesis of design.
Explanation:
cool
Only by making a new account
Computer science certification, Linux professionalism, Java certification, Python certification