A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible.

A. Private Key (Symmetric) Cryptographic Algorithm
B. Key Exchange Cryptographic Algorithm
C. Public Key (Asymmetric) Cryptographic Algorithm
D. RSA Digital Cryptographic Algorithm


C. Public Key (Asymmetric) Cryptographic Algorithm

Computer Science & Information Technology

You might also like to view...

________ validation is generally used to limit the number of characters that can be entered into a cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which security program document contains the most details and step-by-step instructions?

A. Guidelines B. Procedures C. Standards D. Policies

Computer Science & Information Technology

_____ protects information from unauthorized disclosure and safeguards privacy.?

A. ?Availability B. ?Integrity C. ?Confidentiality D. ?Accessibility

Computer Science & Information Technology

The new classes that we create from existing classes are called ____ classes.

A. sibling B. base C. derived D. parent

Computer Science & Information Technology