Computer Science, asked by akhilarajendran7176, 11 months ago

In public key infrastructure, let S and P be secret (private) and public keys respectively of sender
1) sender encrypts with S and receiver decrypts with S
2) sender encrypts with S and receiver decrypts with P
3) sender encrypts with P and receiver decrypts with S
4) sender encrypts with P and receiver decrypts with P

Answers

Answered by nagendrakumar98
0

sandal encrypt service centre receiver description

Similar questions