Asymmetric encryption algorithms use ____________________ keys to perform the encryption and decryption.
Fill in the blank(s) with the appropriate word(s).
two
Computer Science & Information Technology
You might also like to view...
A whole house surge protector protects all electronic devices in your home from major surges by burning out
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is NOT a database security measure?
A) Encrypt and password-protect a database B) Digitally sign and publish a database C) Distribute the database as a PDF file D) Save the database as an ACCDE file
Computer Science & Information Technology