A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
a. Recipient's private key
b. Sender's private key
c. Sender's public key
d. Recipient's public key
Answer: a. Recipient's private key