Computer Science, asked by vijaybharathi, 9 months ago

To encrypt an application whare the protocol required?​

Answers

Answered by Rahul9048
2

At the beginning of the encryption process, the sender must decide what cipher will best disguise the meaning of the message and what variable to use as a key to make the encoded message unique. The most widely used types of ciphers fall into two categories: symmetric and asymmetric.

Answered by Anonymous
0

\huge\mathfrak{\underline{\underline{\red{Answer}}}}</p><p>

In application-level encryption, the process of encrypting data is completed by the application that has been used to generate or modify the data that is to be encrypted. Essentially this means that data is encrypted before it is written to the database.

Similar questions