Describe asymmetric encryption.

What will be an ideal response?


Another encryption technique is asymmetric encryption, also known as public key encryption. Whereas symmetric encryption systems use the same key to both encrypt and decrypt a message, asymmetric encryption uses two different keys. Either key can be used to encrypt or decrypt the message. However, if key A is used to encrypt the message, then only key B can decrypt it; conversely, if key B is used to encrypt a message, then only key A can decrypt it. This technique is most valuable when one of the keys is private and the other is public. The public key is stored in a public location, where anyone can use it. The private key, as its name suggests, is a secret known only to the owner of the key pair.

Computer Science & Information Technology

You might also like to view...

Attachments to ____ are stored in a temporary folder on your computer's hard disk.

A. Webmail B. all emails C. local mail D. zipped files

Computer Science & Information Technology

Today's processor speeds are measured in ________

A) KHz B) MHz C) GHz D) THz

Computer Science & Information Technology

________ apps run in browsers

Fill in the blank(s) with correct word

Computer Science & Information Technology

When drawing with the Pen tool, it's a smart idea to have this selected as the fill color.

A. black B. white C. none D. gray

Computer Science & Information Technology