Answer:
The appropriate response will be "Public key".
Step-by-step explanation:
- A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
- Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.