Public key cryptography is so-named because:
a. It is highly popular
b. Its use is not restricted by patents
c. It utilizes an open source encryption algorithm
d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public
d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public
Computer Science & Information Technology
You might also like to view...
What network environment has centralized servers for authentication?
A) Local B) Domain C) Infrastructure D) Ad hoc
Computer Science & Information Technology
Based on their study of a group of programmers, the best programmers are ________ times more productive than the worst ones.
A) one to two B) three to five C) four to eight D) five to ten
Computer Science & Information Technology