Ppt for network security and cryptography
Answers
Answered by
1
With symmetric cryptography, the same key is used for bothencryption and decryption. ... Key distribution is a tricky problem and was the impetus for developing asymmetric cryptography. With asymmetric crypto, two different keys are used for encryptionand decryption.
Similar questions
Computer Science,
8 months ago
Science,
8 months ago
Social Sciences,
1 year ago
History,
1 year ago
Hindi,
1 year ago
English,
1 year ago