When a public key encryption algorithm is used to protect the confidentiality of a message the sender uses the .................. To encrypt tkey of the .................... Message, and the receiver uses its........................ Key to decrypt the encrypted message?
Answers
Answered by
0
Answer:
Explanation:
Similar questions
Math,
6 months ago
Computer Science,
6 months ago
Math,
6 months ago
Biology,
11 months ago
Computer Science,
11 months ago
Chemistry,
1 year ago
Science,
1 year ago