Bob sends Alice an encrypted message using RSA. What key would Alice need to use to decrypt the message?

A. Public key
B. Private key
C. Shared key
D. The same key that Bob used to encrypt the message

Answer: B
Explanation: RSA is an asymmetric/public key encryption protocol. In asymmetric encryption uses two keys: A message is encrypted with a public key and then decrypted with the private key.

Computer Science & Information Technology

You might also like to view...

Which of the following activities will not be possible if the gateway IP address is set incorrectly on a client's machines?

A. Printing over a local network B. Sniffing the network traffic C. Pinging a remote computer D. Sharing local network files

Computer Science & Information Technology

Copyright ________ is using a copyrighted work without permission

A) infringement B) trespassing C) aggression D) encroachment

Computer Science & Information Technology