1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Step 1
The sender uses the recipient’s public key to encrypt the message
Step 2
The recipient uses their private key to decrypt the message and retrieve the original plaintext
Answer 1
answer 1
Answer 2
answer 2