Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially.Which of the following would explain the situation?

A. An ephemeral key was used for one of the messages
B. A stream cipher was used for the initial email; a block cipher was used for the reply
C. Out-of-band key exchange has taken place
D. Asymmetric encryption is being used

Answer: D. Asymmetric encryption is being used

Computer Science & Information Technology

You might also like to view...

If a programmer wished to program directly in machine language it would be necessary to enter the program as ________ data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the recursive step for the binary search function?

a) search the top half of the array b) search the bottom half of the array c) search both halves of the array d) it depends on whether the target is less than or greater than the middle element

Computer Science & Information Technology