What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?
- A different public key
- A digital certificate
- A private key
- DH
Explanation: When an asymmetric algorithm is used, public and private keys are used for the encryption. Either key can be used for encryption, but the complementary matched key must be used for the decryption. For example, if the public key is used for encryption, the private key must be used for the decryption.
Exam with this question: 3.11.3 Module Quiz - Network Security Concepts
Please login or Register to submit your answer