The list on the right contains steps or components that may be part of an asymmetric encryption algorithm. Drag the steps or components from the right into the proper order on the left so they correctly represent the sequence of events. Not all answers will be used!

Fill in the missing pieces:
Plain data
Choose from the following choices:
Encrypt with a shared secret key
Encrypt with a private key
Encrypted data
Decrypt with a shared secret key
Plain data
Encrypt with a public key
Decrypt with a public key
Decrypt with a private key

5 answers

1. Plain data
2. Encrypt with a public key
3. Encrypted data
4. Decrypt with a private key
1. Plain data
2.
3.
4.
5.
1. Plain data
2. Encrypt with a public key
3. Encrypted data
4. Decrypt with a private key
Fix it
1. Plain data
2. Encrypt with a public key
3. Encrypted data
4. Decrypt with a private key
5. Plain data