subject

Ahmed and one of his close friend, Ali, used to send e-mail using public and private key encryption. He can send e-mail to Ali using the following two methods: He encrypts an e-mail with Ali’s public key and decrypts it with his own private key. He encrypts an e-mail with his own private key and Ali decrypts it with his public key. In fact, anyone can have Ahmed’s public key and hence can read the e-mail sent out by Him through second method. Why he might still want to use second method? Briefly describe and suggest a method of using public and private key encryption which would be better than first and Second method for allowing Ali to read e-mail sent by Ahmed.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 09:00
Howard is designing a chair swing ride. the swing ropes are 5 meters long, and in full swing they tilt in an angle of 29° outside chairs to be 2.75 m above the ground in full swing.
Answers: 1
question
Computers and Technology, 22.06.2019 11:00
in 2007, floridians died in alcohol-related collisions.a.  501b.  1,051c.  5,015d.  10,839
Answers: 1
question
Computers and Technology, 23.06.2019 08:30
When you interpret the behavior of others according to your experiences and understanding of the world your evaluation is
Answers: 1
question
Computers and Technology, 23.06.2019 13:30
Jace needs to answer a question on square roots to win a quiz. how can he use a spreadsheet to find the square root of 786? a. use the functions round and count b. create a table and chart c. use the function sqrt d. use the function now
Answers: 3
You know the right answer?
Ahmed and one of his close friend, Ali, used to send e-mail using public and private key encryption....
Questions
question
Mathematics, 10.07.2019 10:30
question
Mathematics, 10.07.2019 10:30
question
Mathematics, 10.07.2019 10:30
question
Mathematics, 10.07.2019 10:30
question
Mathematics, 10.07.2019 10:30
question
Mathematics, 10.07.2019 10:30
Questions on the website: 13722363