Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This approach is computationally intensive compared to symmetric encryption due to the complexity of algorithms like RSA and ECC. While asymmetric encryption provides enhanced security and key management, its slower performance makes it less suitable for bulk data encryption. Instead, it is often used for key exchange, digital signatures, and secure sessions. Why Other Options Are Incorrect: 1. It uses the same key for encryption and decryption: False; asymmetric encryption uses two distinct keys. 2. It does not require a public key: False; the public key is essential for encryption. 3. It cannot be used for digital signatures: False; asymmetric encryption forms the basis for digital signatures. 4. It is less secure than symmetric encryption: False; asymmetric encryption is generally more secure due to its two-key mechanism. Asymmetric encryption's trade-off between security and performance makes it a foundational technology in modern cryptography.
Minimum amount of Certificate of Deposit is
Which of the following tax generates the maximum amount of revenue for the government of India?
MUDRA Bank has been inaugurated in 2015, what is the full form of MUDRA?
...Loan granted for purchase of white goods by the banks is known as ______.
Nationalisation of 14 banks happened in the year:
India’s first regional rural bank is ___________
IMPS stands for
NHB RESIDEX is the contries first official housing price index. In this reference, clock which is correct?
I. HPI@ mark price is based on actua...
Which electronic funds transfer system in India is available 24/7 throughout the year, including on holidays also?
The Reserve Bank of India was set up on the basis of the recommendations of the ________ Commission.