Q. In same keys are implemented for encrypting as well as decrypting the information. (Solved)

1. symmetric key encryption

2. asymmetric key encryption

3. asymmetric key decryption

4. hash-based key encryption

  • a. symmetric key encryption
Subscribe Now

Get All Updates & News