When a public key encryption algorithm is used to protect the confidentiality of a message the sender uses the .................. To encrypt tkey of the .................... Message, and the receiver uses its........................ Key to decrypt the encrypted message?
Answers
Answered by
0
Answer:
Explanation:
Similar questions