Public-key cryptography is symmetric in that ________.

a) it decrypts messages using the same key it uses to encrypt
b) both the sender and the receiver use the same key
c) it employs two inversely related keys
d) either host can create a key and both hosts can use it

c) it employs two inversely related keys

Computer Science & Information Technology

You might also like to view...

Data that describes other data is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A microphone is a device used to

A) Take voice and digitize it to be heard on a conference call B) Project the voice to be heard for long distances C) Record the voice on the sound control tablet D) Digitize the voice so that it is not recognizable

Computer Science & Information Technology