Join the IDNLearn.com community and start exploring a world of knowledge today. Discover in-depth and trustworthy answers from our extensive network of knowledgeable professionals.
Sagot :
The cryptographic method that susanne can use to ensure that a document can be encrypted with a key and decrypted with a different key is called Asymmetric cryptographic method.
What is asymmetric method of encryption?
Asymmetric cryptography, commonly referred to as public-key cryptography, is a method for encrypting and decrypting messages and safeguarding them from unwanted access or use. It makes use of a pair of linked keys, a public key and a private key.
One of the most reliable (and widely used) asymmetric key encryption techniques is RSA (Rivest Shamir Adleman). With today's technology, it is practically impossible to breach. 2
Although it uses a key pair, asymmetric encryption is also known as public key encryption. In order to be utilized together, two mathematically related keys—the public key and the private key—are generated. The private key is always kept private and is only ever used by the owner.
Learn more about Asymmetric cryptographic method from
https://brainly.com/question/26379578
#SPJ1
See full question below
. Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key? Public Ephemeral Symmetric Asymmetric 19.
Thank you for contributing to our discussion. Don't forget to check back for new answers. Keep asking, answering, and sharing useful information. IDNLearn.com is your source for precise answers. Thank you for visiting, and we look forward to helping you again soon.