Start learning 50% faster. Sign in now
Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This approach is computationally intensive compared to symmetric encryption due to the complexity of algorithms like RSA and ECC. While asymmetric encryption provides enhanced security and key management, its slower performance makes it less suitable for bulk data encryption. Instead, it is often used for key exchange, digital signatures, and secure sessions. Why Other Options Are Incorrect: 1. It uses the same key for encryption and decryption: False; asymmetric encryption uses two distinct keys. 2. It does not require a public key: False; the public key is essential for encryption. 3. It cannot be used for digital signatures: False; asymmetric encryption forms the basis for digital signatures. 4. It is less secure than symmetric encryption: False; asymmetric encryption is generally more secure due to its two-key mechanism. Asymmetric encryption's trade-off between security and performance makes it a foundational technology in modern cryptography.
President Droupadi Murmu became the first Indian to be honoured with the Grand Order of the Chain of the Yellow Star. It is the highest civilian award o...
Election of Lok Sabha Speaker happens-
What is the estimated real GDP growth rate for the fiscal year 2023-24, as released by the National Statistical Office (NSO) under the Ministry of Stati...
Where is the National Remote Sensing Centre (NRSC) located?
From which state does the documentary film 'To Kill A Tiger,' nominated for the 96th Academy Awards (Oscar 2024) in the Best Documentary Feature Film ca...
A computer monitor is also known by the name:
The Registration of Birth and Death Act came into force in the year ___________.
Highest forest area is found in which state?
Which of the following crop is not grass?
Who hosted the 2011 ODI cricket world cup?