Discuss the public key encryption technique.
What will be an ideal response?
This approach uses two different keys: one for encoding messages and the other for decoding them. The recipient has a private key used for decoding that is kept secret. The encoding key is public and published for everyone to use. Receivers never need to share private keys with senders, which reduces the likelihood that they fall into the hands of an intruder. One of the most trusted public key encryption methods is Rivest-Shamir-Adleman (RSA). This method is, however, computationally intensive and much slower than private key encryption.
PTS: 1
You might also like to view...
To place a trademark symbol, you begin by clicking the ________ tab on the Ribbon
A) Design B) Layout C) Insert D) Add-ins
In Windows 8, what does swipe do?
A) Performs a primary action B) Pans across the screen C) Rotates something D) Selects something