Bob would like to send a confidential, encrypted message to Alice using asymmetric cryptography. What key should Bob use to create the message?
A. Bob's private key
B. A shared secret key
C. Alice's public key
D. Bob's public key



Answer :

Other Questions