How does asymmetric encryption work?
What will be an ideal response?
Asymmetric encryption uses two keys instead of only one. These keys are mathematically related and are called the public key and the private key. The public key is known to everyone and can be freely distributed, while the private key is known only to the individual to whom it belongs. When Bob wants to send a secure message to Alice, he uses Alice's public key to encrypt the message. Alice then uses her private key to decrypt it.
You might also like to view...
Which is not a method of classifying a network?
A) The distance between the nodes B) Wither it is a network of Apple or Windows computers C) The protocols used for the network D) The way the network is managed
A(n) ________ file is an image file that has already been compressed
Fill in the blank(s) with correct word