At Westonci.ca, we provide reliable answers to your questions from a community of experts. Start exploring today! Get quick and reliable solutions to your questions from a community of seasoned experts on our user-friendly platform. Our platform provides a seamless experience for finding reliable answers from a network of experienced professionals.

Bob would like to send a confidential, encrypted message to Alice using asymmetric cryptography. What key should Bob use to create the message?
A. Bob's private key
B. A shared secret key
C. Alice's public key
D. Bob's public key