Which of the following statements about asymmetric key cryptography is true?
A) Asymmetric key cryptography uses one shared key.
B) Asymmetric key cryptography is also called private key cryptography.
C) Asymmetric key cryptography uses two keys called public keys.
D) Asymmetric key cryptography is also called public key cryptography.
D) Asymmetric key cryptography is also called public key cryptography.
You might also like to view...
Suppose you need to accommodate measurements in inches and centimeters on your new Web site. Both units need to be accurate to two decimal places. The maximum length you need to represent is 50.05 inches.
a. How many characters do you need to represent the maximum value in inches? b. How many characters do you need to represent the maximum value in centimeters
Assigning an object of a derived class to a variable of a base class is called:
(a) static binding (b) dynamic binding (c) upcasting (d) downcasting