The encryption method ________ uses two keys with one key used to encode and a second related, but different, key to decode the message
Fill in the blank with correct word.
Answer: asymmetric cryptography
Business
You might also like to view...
What does setting objectives and goals do?
Fill in the blank(s) with the appropriate word(s).
Business
Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers
Indicate whether the statement is true or false
Business