James is sending an email to Bob. To ensure confidentially James needs to send the email in an encrypted format using PKI. What will James use to encrypt the email so Bob can decrypt it?
|Threats, Attacks and Vulnerabilities|
|Technologies and Tools|
|Architecture and Design|
|Identity and Access Management|
|Cryptography and PKI|