63.1k views
4 votes
Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?

A. Alice's private key
B. Bob's public key
C. Bob's private key
D. Alice's public key

User Duvo
by
7.4k points

1 Answer

5 votes

Final answer:

Bob should use Alice's public key to decrypt the message sent by Alice using an asymmetric cryptography algorithm.

Step-by-step explanation:

To decrypt the message sent by Alice using an asymmetric cryptography algorithm, Bob should use Alice's public key.

In asymmetric cryptography, a pair of keys is used: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. In this case, since Alice sent the message, she used her private key to encrypt it, and therefore Bob needs to use her public key to decrypt it.

User Simon Arsenault
by
8.6k points