samaramcleod2376 samaramcleod2376 03-01-2024 Computers and Technology contestada when an asymmetic cryptographic process uses the sender private key to encrypt a message the sender public key must be used to decrypt the messagea. trueb. false