What is an encryption system that uses two keys: a public key that everyone can have
and a private key for only the recipient?
a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software
and a private key for only the recipient?
a. Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software