Plaintext is recovered from the ciphertext using the paired key and _____________ .

A. a digital signature
B. a recovery encryption
C. a decryption algorithm
D. an encryption algorithm

C. a decryption algorithm

Computer Science & Information Technology

You might also like to view...

The following statement creates an anonymous type:enum {1ST, 2ND, 3RD, 4TH} places;

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following questions about smart pointers:

a) Briefly describe the advantages of shared_ptr over auto_ptr. b) Describe a situation in which a custom deleter function would be used. c) Describe a situation in which you’d use a weak_ptr that is not responsible for lifetime management of its resource.

Computer Science & Information Technology