1.

In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.(a) Symmetric Key Encryption(b) Asymmetric Key Encryption(c) Asymmetric Key Decryption(d) Hash-based Key EncryptionI have been asked this question by my college professor while I was bunking the class.This intriguing question originated from Types of Cryptography in portion Cryptography in Security of Cyber Security

Answer»

Correct ANSWER is (b) Asymmetric Key Encryption

The explanation: In Asymmetric Key Encryption 2 different keys are implemented for encrypting as well as decrypting that PARTICULAR information. Inputs it takes are the PLAIN TEXT and 2 different key.



Discussion

No Comment Found

Related InterviewSolutions