Describe asymmetric encryption.
What will be an ideal response?
Another encryption technique is asymmetric encryption, also known as public key encryption. Whereas symmetric encryption systems use the same key to both encrypt and decrypt a message, asymmetric encryption uses two different keys. Either key can be used to encrypt or decrypt the message. However, if key A is used to encrypt the message, then only key B can decrypt it; conversely, if key B is used to encrypt a message, then only key A can decrypt it. This technique is most valuable when one of the keys is private and the other is public. The public key is stored in a public location, where anyone can use it. The private key, as its name suggests, is a secret known only to the owner of the key pair.
You might also like to view...
Attachments to ____ are stored in a temporary folder on your computer's hard disk.
A. Webmail B. all emails C. local mail D. zipped files
Today's processor speeds are measured in ________
A) KHz B) MHz C) GHz D) THz
________ apps run in browsers
Fill in the blank(s) with correct word
When drawing with the Pen tool, it's a smart idea to have this selected as the fill color.
A. black B. white C. none D. gray