Join the IDNLearn.com community and start exploring a world of knowledge today. Discover in-depth and trustworthy answers from our extensive network of knowledgeable professionals.

which cryptographic method should susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Sagot :

The cryptographic method that susanne can use to ensure that a document can be encrypted with a key and decrypted with a different key is called Asymmetric  cryptographic method.

What is asymmetric method of encryption?

Asymmetric cryptography, commonly referred to as public-key cryptography, is a method for encrypting and decrypting messages and safeguarding them from unwanted access or use. It makes use of a pair of linked keys, a public key and a private key.

One of the most reliable (and widely used) asymmetric key encryption techniques is RSA (Rivest Shamir Adleman). With today's technology, it is practically impossible to breach. 2

Although it uses a key pair, asymmetric encryption is also known as public key encryption. In order to be utilized together, two mathematically related keys—the public key and the private key—are generated. The private key is always kept private and is only ever used by the owner.

Learn more about Asymmetric  cryptographic method from

https://brainly.com/question/26379578
#SPJ1

See full question below

. Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key? Public Ephemeral Symmetric Asymmetric 19.