Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice receives the message, she decrypts it using a private key. What kind of encryption process is this
+4
Answers (1)
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Home » Computers & Technology » Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice receives the message, she decrypts it using a private key. What kind of encryption process is this