a. Symmetric Key Encryption |
b. Asymmetric Key Encryption |
c. Asymmetric Key Decryption |
d. Hash-based Key Encryption |
Answer: Asymmetric Key Encryption |
a. Symmetric Key Encryption |
b. Asymmetric Key Encryption |
c. Asymmetric Key Decryption |
d. Hash-based Key Encryption |
Answer: Asymmetric Key Encryption |