Public key cryptography is so-named because:

a. It is highly popular
b. Its use is not restricted by patents
c. It utilizes an open source encryption algorithm
d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public

d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public

Computer Science & Information Technology

You might also like to view...

What network environment has centralized servers for authentication?

A) Local B) Domain C) Infrastructure D) Ad hoc

Computer Science & Information Technology

Based on their study of a group of programmers, the best programmers are ________ times more productive than the worst ones.

A) one to two B) three to five C) four to eight D) five to ten

Computer Science & Information Technology