Computer Science, asked by abhijit9201, 1 year ago

When a public key encryption algorithm is used to protect the confidentiality of a message the sender uses the .................. To encrypt tkey of the .................... Message, and the receiver uses its........................ Key to decrypt the encrypted message?

Answers

Answered by anuska102018
0

Answer:

Explanation:

Google

Similar questions