answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What does the recipient need to decrypt?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the meaning of encrypts?

The meaning of asymmetric encryption is that one key that is unique to a recipient is used only to decrypt data instead of a key being used to encrypt and decrypt that data.


What is the past tense of decrypt?

The past tense of decrypt is decrypted.


How do you decrypt 3 digit numbers?

You can use C++ program to decrypt 3 digit number


What is the meaning of asymmetric encryption?

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption. Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret. Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message. Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key. The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.


How do you decrypt a copyright?

Copyright is not encrypted.


What is cryptography and how is it related to computers?

Cryptography is a means of encrypting or obscuring information. It is related to computers mainly by the internet. When data is passed between a client and a server it can be encrypted so that only the desired recipient can decrypt the data and read it, preventing eaves dropping or interception of the data because the eaves dropper will not be able to decrypt the data (not easily anyway). It can also be used when storing data on a computer - thereby preventing anyone decrypting the data and viewing it.


How data encrypt and decrypt from PC to PC using micro controller?

How data encrypt and decrypt from PC to PC using micro controller?


What words end in crypt?

decrypt, encrypt


What do you need if you want to to decrypt messages and files from a trusted sender?

You would have to go through and figure out the encryption code. You can then figure out what is being said. Sometimes you just need the password that they send.


What is the disadvantage of using CBC for random access compared with CTR mode?

You need at least Cn-1 and Cn to decrypt pn when data is encrypted using CBC mode, for ctr mode, just Cn is required in order to decrypt Pn provided the offset is known. --Swair Mehta


Has email replaced the need to have a fax machine?

Assuming that the recipient has a computer, email has largely replaced the need for a fax machine in most office environments as most documents can be scanned, emailed and then printed out by the recipient as needed.


Who determines whether the recipient has a legitimate need for access to the classified information?

Possessor