Computer Science, asked by Rimmyy55711, 1 year ago

List out the content of tickets in cryptography and network security

Answers

Answered by Anonymous
1
With symmetric cryptography, the same key is used for bothencryption and decryption. ... Key distribution is a tricky problem and was the impetus for developing asymmetric cryptography. With asymmetric crypto, two different keys are used for encryptionand decryption.
Similar questions