Two users, Dave and Dixine, wish to communicate privately. Dave and Dixine each own a key pair consisting of a public key and a private key. A public key was used to encrypt a message and the corresponding private key was used to decrypt. What is the major security issue with this scenario?
A.
Private keys are revealed during the initial transaction.
B.
Information encrypted with a public key can be decrypted too easily with out the private key.
C.
An attacker can intercept the data mid-stream, and replace the original signature with his or her own, using his private key.
D.
None of the Above.