Multiple Choice
Asymmetric encryption is also known as ___________ .
A) public-key encryption
B) private-key encryption
C) optimal encryption
D) digital-key encryption
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: Timing attacks are ciphertext attacks that are
Q5: A single algorithm that will calculate the
Q7: To counter attacks such as CCAs,RSA Security,Inc.
Q11: The _ indicates that the subscriber identified
Q15: Asymmetric encryption can be used for confidentiality
Q18: _ are two related keys, a public
Q23: A major advance in symmetric cryptography occurred
Q26: Asymmetric encryption transforms plaintext into _ using
Q31: Public-key encryption is more secure from cryptanalysis
Q34: Before the application of the public-key cryptosystem