If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

A. Alice's private key
B. Bob's public key
C. Alice's public key
D. Bob's private key

C. Alice's public key

Computer Science & Information Technology

You might also like to view...

Match each of the following decimal values to its prefix:

I. 1,000 II. 1,000,000 III. 1,000,000,000 IV. 1,000,000,000,000 IV. 1,000,000,000,000,000 A. mega B. kilo C. giga D. tera E. peta

Computer Science & Information Technology

FIGURE EX 8-1 In Figure EX 8-1 above, under "Education Pays," the red and blue boxes labeled "Men" and "Women" is the ____.

A. legend B. vertical axis title C. horizontal axis title D. chart title

Computer Science & Information Technology