the ciphertext converted back into plaintext
1. Two parties, Party A and Party B, regularly exchange messages using
public key cryptography. One party, Party A, believes that its private
encryption key has been compromised. What action should Party B take?
a. Request a new public key from Party A.
b. Request a new private key from Party A.
c. Send a new public key to Party A.
d. Send a new private key to Party A.
2. The Adva ...
Answered
Other
/
Other
21 Mar 2016