The most widely used public-key cryptosystem is __________ .

A. optimal asymmetric encryption
B. asymmetric encryption
C. RSA
D. DES

C. RSA

Computer Science & Information Technology

You might also like to view...

________ software requires the user to pay a fee for it

Fill in the blank(s) with correct word

Computer Science & Information Technology

A character array terminated with the null character is most correctly called

a. a c-string b. a character array c. a string d. none of the above

Computer Science & Information Technology