Computer Science for IGCSE & O level - Data Transmission (Section 9 - No. 20)

When employing asymmetric encryption, which of the following users would keep the private key?
The sender
The receiver
Both sender and receiver
None of the above

Explanation

The receiver uses the private key to decrypt the message encrypted with their public key. The sender encrypts the message using the receiver's public key.

Comments (0)

Advertisement