Discover the answers to your questions at Westonci.ca, where experts share their knowledge and insights with you. Get immediate answers to your questions from a wide network of experienced professionals on our Q&A platform. Our platform offers a seamless experience for finding reliable answers from a network of knowledgeable professionals.

To authenticate the receiver (B), the sender (A) e-mails a challenge message to B. B will use her ___________ key to encrypt the challenge message and send it to A. If A is able to use B's ___________ key to decrypt and get the plaintext of the challenge message, A has authenticated B successfully.