Computer Science for IGCSE & O level - Data Transmission (Section 5 - No. 49)

In asymmetric encryption, what happens if someone has your public key?
They can decrypt messages sent to you.
They can encrypt messages to you.
They can access your private key.
They cannot do anything with it.

Explanation

The public key is used to encrypt data that can only be decrypted with the corresponding private key.

Comments (0)

Advertisement