Matthew would like to send a private message to Richard using a symmetric cryptosystem. What key should Matthew use to encrypt the message?

a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key

Answer: e. Shared secret key

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a method for adding actions to a macro with the Macro Designer?

A) Add a command button to a New Action command. B) Click the Add New Action and choose the action you want to add to your macro. C) Type the action name directly into the Add New Action box. D) Locate an action in the Action Catalog and double-click it to add it to the macro.

Computer Science & Information Technology

?A formula contains a calculation, which specifies the operation to be performed, and ____, which are the values involved in the calculation.

A. ?addresses B. ?filters C. ?vectors D. ?arguments

Computer Science & Information Technology