Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.

Fill in the blank(s) with the appropriate word(s).

symmetric

Computer Science & Information Technology

You might also like to view...

In Access 2016, it is not possible to have records in one table that have no matching records in a related table

Indicate whether the statement is true or false

Computer Science & Information Technology

In a tab-delimited file, ________ separate the data

A) commas B) tabs C) spaces D) hyphens

Computer Science & Information Technology