In encryption, can public/private key be used symmetrically and asymmetrically?
-
Do you have a good explanation source for how public/private key encryption works? And how does one REALLY get the public key? And what does each end need (in both symmetric & asymmetic if applicable) to do the public/private encryption method?
-
Answer:
Well a public/private key encryption is called an asymmetric system because the sender and receiver use two different keys to encrypt the message.the sender uses the public key and the receiver can decipher the message with the private key. Symmetric key is a single key used to both encrypt and decrypt a message. Please visit the site below for more info: http://en.wikipedia.org/wiki/Encryption
Sufi at Yahoo! Answers Visit the source
Related Q & A:
- Can a MongoDB key have two arrays?Best solution by Stack Overflow
- Can Old Scuba tanks be used for CO2?Best solution by Yahoo! Answers
- Can my private practice be successful under these circumstances?Best solution by Yahoo! Answers
- Can an external HD be used as my primary HD?Best solution by tomshardware.com
- Can a Japanese Saw be used to cut hydracal?Best solution by answers.yahoo.com
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.