Which statement describes how the sender of the message is verified when asymmetric encryption is used?

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

Which statement describes how the sender of the message is verified when asymmetric encryption is used?

A.
The sender encrypts the message using the sender’s public key, and the receiver decrypts the message using the sender’s private key.

B.
The sender encrypts the message using the sender’s private key, and the receiver decrypts the message using the sender’s public key.

C.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the message using the receiver’s private key.

D.
The sender encrypts the message using the receiver’s private key, and the receiver decrypts the message using the receiver’s public key.

E.
The sender encrypts the message using the receiver’s public key, and the receiver decrypts the message using the sender’s public key.



Leave a Reply 0

Your email address will not be published. Required fields are marked *