The security administrator is tasked with authenticating users to access an encrypted database. Authentication takes place using PKI and the encryption of the database uses a separate cryptographic process to decrease latency. Which of the following would describe the use of encryption in this situation?
A.
Private key encryption to authenticate users and private keys to encrypt the database
B.
Private key encryption to authenticate users and public keys to encrypt the database
C.
Public key encryption to authenticate users and public keys to encrypt the database
D.
Public key encryption to authenticate users and private keys to encrypt the database