The encryption method ________ uses two keys with one key used to encode and a second related, but different, key to decode the message

Fill in the blank with correct word.

Answer: asymmetric cryptography

Business

You might also like to view...

What does setting objectives and goals do?

Fill in the blank(s) with the appropriate word(s).

Business

Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers

Indicate whether the statement is true or false

Business