Start learning 50% faster. Sign in now
Asymmetric encryption uses a pair of keys: a public key and a private key. The public key is openly distributed and used for encrypting data, while the private key, which is kept confidential by the owner, is used for decryption. This system ensures secure communication because even if the public key is intercepted, only the intended recipient can decrypt the data with their private key. This encryption method is widely used in securing emails, digital signatures, and SSL/TLS protocols for web security. It provides confidentiality and authentication, as only the private key owner can read or sign the encrypted data. For instance, RSA is a commonly used asymmetric encryption algorithm. Why Other Options Are Incorrect :
Which of the following open source e-learning platform has been developed by IIT-Kanpur?
_______ is a coded entries which are used to gain access to a computer system.
Which of the following is also termed as multimedia education?
Which example is given in the passage as an embedded operating system?
Which of the following animations cannot be done in PowerPoint?
What type of operating system manages a group of networked computers and makes them appear as a single computer?
In which operating system is the 'bash' shell commonly used?
________ are used in an e-mail to express emotions of feelings clearly.
___________ appropriately relates with starting up an operating system.
In Excel, ________ contains one or more worksheets.