header bg

Scan QR code or get instant email to install app


Which of the following keys should she use to encrypt the message in the case Mary is using asymmetric cryptography to send a message to Sam so that only Sam can read it?

A Sam's public key

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *