ejayy2890 ejayy2890 19-06-2024 Computers and Technology Answered Bob would like to send a confidential, encrypted message to Alice using asymmetric cryptography. What key should Bob use to create the message?A. Bob's private keyB. A shared secret keyC. Alice's public keyD. Bob's public key