Welcome to Westonci.ca, your ultimate destination for finding answers to a wide range of questions from experts. Experience the convenience of getting accurate answers to your questions from a dedicated community of professionals. Get precise and detailed answers to your questions from a knowledgeable community of experts on our Q&A platform.

which cryptographic method should susanne use to ensure that a document can be encrypted with a key and decrypted with a different key?

Sagot :

The cryptographic method that susanne can use to ensure that a document can be encrypted with a key and decrypted with a different key is called Asymmetric  cryptographic method.

What is asymmetric method of encryption?

Asymmetric cryptography, commonly referred to as public-key cryptography, is a method for encrypting and decrypting messages and safeguarding them from unwanted access or use. It makes use of a pair of linked keys, a public key and a private key.

One of the most reliable (and widely used) asymmetric key encryption techniques is RSA (Rivest Shamir Adleman). With today's technology, it is practically impossible to breach. 2

Although it uses a key pair, asymmetric encryption is also known as public key encryption. In order to be utilized together, two mathematically related keys—the public key and the private key—are generated. The private key is always kept private and is only ever used by the owner.

Learn more about Asymmetric  cryptographic method from

https://brainly.com/question/26379578
#SPJ1

See full question below

. Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key? Public Ephemeral Symmetric Asymmetric 19.