Ask Question
17 July, 16:10

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

+4
Answers (1)
  1. 17 July, 17:07
    0
    userB will use his/her private key.

    Explanation:

    The steps involved in using asymmetric cryptographic algorithm are as follow:

    1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

    2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

    3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

    4. When UserB receives the message, she decrypts it using her private key.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers