Computer Science for IGCSE & O level - Data Transmission (Section 8 - No. 2)
When using asymmetric encryption, who typically has the public key?
Only the sender
Only the receiver
Both the sender and receiver
Anyone who wants to send a message to the receiver.
Explanation
The public key is shared so that anyone can encrypt a message for the recipient.
Comments (0)
