Q. In same keys are implemented for encrypting as well as decrypting the information. (Solved)
1. symmetric key encryption
2. asymmetric key encryption
3. asymmetric key decryption
4. hash-based key encryption
- a. symmetric key encryption
1. symmetric key encryption
2. asymmetric key encryption
3. asymmetric key decryption
4. hash-based key encryption