Company A sends a PGP encrypted file to company B. If company A used company B's public key to encrypt the file, which of the following should be used to decrypt data at company B?
Network Security | |
Compliance and Operational Security | |
Threats and Vulnerabilities | |
Application, Data and Host Security | |
Access Control and Identity Management | |
Cryptography |