Susan's private key (The message must be encrypted using Susan's key so that she can decrypt it and read it).
Utilize: Bob's secret key. (Bob encrypts the hash using his private key. Asymmetric cryptography's most popular algorithm. The XTS-AES 128-bit encryption algorithm is used by BitLocker Device Encryption. HTTPS encrypts messages using an encryption protocol. Previously known as Secure Sockets Layer, the technology is now known as Transport Layer Security (TLS) (SSL). Diffusion refers to the idea that altering only one input character will result in numerous output characters changing. A particular family of algorithms is employed to secure the integrity of trades in addition to cryptographic techniques that are used to ensure the confidentiality of conversations. The term "cryptographic hash functions" refers to them.
Learn more about technology here-
https://brainly.com/question/8645052
#SPJ4