Bob wants to send Alice a file that is encrypted using public key cryptography.

Which of the following statements is correct regarding the use of public key cryptography in this

scenario?

A.

Bob will use his private key to encrypt the file and Alice will use her private key to decrypt the file.

B.

Bob will use his public key to encrypt the file and Alice will use Bob’s private key to decrypt the file.

C.

Bob will use Alice’s public key to encrypt the file and Alice will use her private key to decrypt the

file.

D.

Bob will use his public key to encrypt the file and Alice will use her private key to decrypt the file.

E.

Bob will use Alice’s public key to encrypt the file and Alice will use Bob’s public key to decrypt the

file.