Select from following answers:- jon sends mac his private key, and mac sends jon her private key
- jon sends mac his public key, and mac sends jon her public key.

- jon sends mac his public key, and mac sends jon her private key.
- All Above
By sending each other their public key, they can then encrypt data with the other party’s public key to send them data .
Show Correct Answer
Source: microsoft book (c#) | |
Alert Moderator