EMERGING TRENDS IN COMPUTING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
private key
|
|
public key
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Public key encryption uses two different keys. One key is used to encrypt the information and the other is used to decrypt the information. Sometimes this is referred to as asymmetric encryption because two keys are required to make the system and/or process work securely.
Detailed explanation-2: -What is asymmetric encryption? Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.
Detailed explanation-3: -Solution: Public-key encryption is a cryptographic system that uses two keys-a public key known to everyone and a private or secret key known only to the recipient of the message.