What to decrypt the message?

To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm. In this case, the receiver of the message must use what to decrypt the message?
A. sender’s digital signature
B. sender’s shared key
C. sender’s private key
D. sender’s public key

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.