Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.

Fill in the blank(s) with the appropriate word(s).

two

Computer Science & Information Technology

You might also like to view...

A whole house surge protector protects all electronic devices in your home from major surges by burning out

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT a database security measure?

A) Encrypt and password-protect a database B) Digitally sign and publish a database C) Distribute the database as a PDF file D) Save the database as an ACCDE file

Computer Science & Information Technology