Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?

Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
A . PKI uses an independent administrator to manage the public key.
B . The public key is authenticated against reliable third-party identification.
C . PKI’s public accessibility allows it to be used readily for e-commerce.
D . The private key uniquely authenticates each party to a transaction.

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments