Computer Science for IGCSE & O level - Data Transmission (Section 8 - No. 2)

When using asymmetric encryption, who typically has the public key?
Only the sender
Only the receiver
Both the sender and receiver
Anyone who wants to send a message to the receiver.

Explanation

The public key is shared so that anyone can encrypt a message for the recipient.

Comments (0)

Advertisement