Computer Science for IGCSE & O level - Data Transmission (Section 12 - No. 29)
What does the sender typically do with the public key in an asymmetric system?
Keep it private.
Share it with anyone.
Destroy it after encryption.
Use it to decrypt the data.
Explanation
The public key is designed to be shared.
Comments (0)
