Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.
Fill in the blank(s) with the appropriate word(s).
symmetric
Computer Science & Information Technology
You might also like to view...
In Access 2016, it is not possible to have records in one table that have no matching records in a related table
Indicate whether the statement is true or false
Computer Science & Information Technology
In a tab-delimited file, ________ separate the data
A) commas B) tabs C) spaces D) hyphens
Computer Science & Information Technology