Bob wants to send Alice a file that is encrypted using public key cryptography. Which of the
following statements is correct regarding the use of public key cryptography in this
scenario?

A.
Bob will use his private key to encrypt the file and Alice will use her private key to decrypt
the file.
B.
Bob will use his public key to encrypt the file and Alice will use Bob’s private key to
decrypt the file.
C.
Bob will use Alice’s public key to encrypt the file and Alice will use her private key to
decrypt the file.
D.
Bob will use his public key to encrypt the file and Alice will use her private key to decrypt
the file.
E.
Bob will use Alice’s public key to encrypt the file and Alice will use Bob’s public key to
decrypt the file.
I choose C
0
0