1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
6

In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used

to encrypt and decrypt. give at least one reason why asymmetric encryption is useful
Computers and Technology
2 answers:
Brrunno [24]3 years ago
5 0

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

Bond [772]3 years ago
3 0
<span>Encryption is the process of securing the data or information by storing and even transmitting data with advanced principles of mathematics. in asymmetric encryption there is a concept of public key that is made available to anyone who wants the access and is passed over the internet and a private key which attained by just one person. One reason asymmetric encryption is useful because it is more secure because the ownership of the secure private key is held always with one person and the public key is shared to the associated ones.</span>
You might be interested in
Requirements description:
Andrews [41]

Answer:

The code has been written in Java.

The source code of the file has been attached to this response. The source code contains comments explaining important lines of the program.

A sample output got from a run of the application has also been attached.

To interact with the program, kindly copy the code into your Java IDE and save as Cafe.java and then run the program.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
75f69c356ebff0797de4ffcfb6f8c22e.png
8 0
3 years ago
How to drive more website traffic?
lidiya [134]

Hello there,

How to drive more website traffic?

Answer: Advertise

8 0
3 years ago
Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software
Scilla [17]

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

6 0
2 years ago
What does gif stand for in computer terms?
SSSSS [86.1K]
<span>GIF stands for Graphics Interchange Format</span> which was released by CompuServe in 1987. The Graphics in GIF is why some people argue against it's originally intended pronunciation as "jif" (like the peanut butter) 
4 0
3 years ago
Help!!!!!!<br>please<br>Who will give the answer I'll mark him/her as brainlist..​
damaskus [11]
17, 12.5, 6, and 10. HOPE THIS HELPS
4 0
2 years ago
Other questions:
  • A system developer needs to provide machine-to-machine interface between an application and a database server in the production
    6·1 answer
  • Page UND
    8·1 answer
  • Which file extension takes less storage space?
    13·2 answers
  • What are the different nail disorders?
    13·1 answer
  • Which protocol sends a request to view or download a website or file ​
    7·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
    5·1 answer
  • This is Very very Important to me[BRAINLIEST)✅​
    5·1 answer
  • Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
    13·1 answer
  • The ____ file is typically saved with a prefix of inc_.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!