Start learning 50% faster. Sign in now
Asymmetric encryption uses a pair of keys: a public key and a private key. The public key is openly distributed and used for encrypting data, while the private key, which is kept confidential by the owner, is used for decryption. This system ensures secure communication because even if the public key is intercepted, only the intended recipient can decrypt the data with their private key. This encryption method is widely used in securing emails, digital signatures, and SSL/TLS protocols for web security. It provides confidentiality and authentication, as only the private key owner can read or sign the encrypted data. For instance, RSA is a commonly used asymmetric encryption algorithm. Why Other Options Are Incorrect :
What is the length of the playing surface in table tennis?
Which instrument is used to measure atmospheric pressure?
Which of the following statements is/are incorrect?
1. IMF forecasts India’s growth at 7% for 2024-25 and 7.5% for 2025-26.
2. India is ...
Match the following ancient Indian texts with their focus areas:
Who made history by becoming the first male player to participate in 150 T20 Internationals?
Which company has entered into a contract worth Rs 445 Crores with the Uttar Pradesh Government for the implementation of the next-generation UP Dial 11...
Match the following tombs with their distinctive features: