To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm. In this case, the receiver of the message must use what to decrypt the message?
To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm. In this case, the receiver of the message must use what to decrypt the message?
To provide origin authentication in asymmetric encryption, the sender encrypts the message with their private key. The receiver then must use the sender's public key to decrypt the message. This ensures that only the sender, who possesses the private key, could have sent the message, thus providing authentication. Therefore, the correct answer is the sender’s public key.
I think the answer should be C...