Saved Bookmarks
| 1. |
In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.(a) Symmetric Key Encryption(b) Asymmetric Key Encryption(c) Asymmetric Key Decryption(d) Hash-based Key EncryptionI have been asked this question by my college professor while I was bunking the class.This intriguing question originated from Types of Cryptography in portion Cryptography in Security of Cyber Security |
|
Answer» Correct ANSWER is (b) Asymmetric Key Encryption |
|