Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that
A) The public key had been compromised.
B) The private key had been compromised.
C) The symmetric encryption key had been compromised.
D) The asymmetric encryption key had been compromised.