Answer & ExplanationAnswer: Option [D]
Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key.
Encryption is done using X's private key followed by Y's public key to prevent unauthorized users in accessing the message by converting it to ciphertext.
Decryption is done to retrieve the original message from the ciphertext by using Y’s private key followed by X’s public key.