In the use of asymmetric keys (use of private-public key pairs).If a service wants to ensure it is no longer their concern (afterencryption) that a message would be intercepted what key would theyuse?
Solution
The keys in public key encryption are non-matching but they aremathematically related. One key (it does not matter which) is usedfor encryption. That key is useless for decryption. Only thematching key can be used for decryption.
The sender should encrypt the message using his private key, sothat if anyone intercepts can not figure out the plain text,because key used is private and is only known to the
OR
OR