Computer Science for IGCSE & O level - Data Transmission (Section 8 - No. 36)
In asymmetric encryption, what is the intended use of the public key?
Decrypt the data.
To be kept private.
To encrypt the data.
To generate the private key.
Explanation
Public keys are used for encrypting data.
Comments (0)
