HideIt Company uses data encryption for certain key data in its application systems. Which of the following statements is correct with respect to data encryption?
A. Data encryption is based on the concept of keys. With data encryption, the sophistication of the encryption algorithm is important and the length of the key is not significant.
B. In asymmetric encryption, a public key is used to encrypt messages. The same public key is transmitted along with the message and is used to decrypt the message at the other end.
C. In asymmetric encryption, a public key is used to encrypt messages. A private key is normally used to decrypt the message at the other end.
D. Symmetric encryption techniques are much more computationally intensive than asymmetric encryption techniques.