Westonci.ca is the ultimate Q&A platform, offering detailed and reliable answers from a knowledgeable community. Discover a wealth of knowledge from experts across different disciplines on our comprehensive Q&A platform. Connect with a community of professionals ready to help you find accurate solutions to your questions quickly and efficiently.

To authenticate the receiver (B), the sender (A) e-mails a challenge message to B. B will use her ___________ key to encrypt the challenge message and send it to A. If A is able to use B's ___________ key to decrypt and get the plaintext of the challenge message, A has authenticated B successfully.