1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
11

A class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is pu

blic is called?
Computers and Technology
1 answer:
Maslowich3 years ago
7 0

Answer:

Asymmetric-key encryption or algorithm.

Explanation:

Cryptographic algorithms are a step-by-step approach of manipulating data by basically converting it from its raw plain format(which is a readable format) to a protected form. A cryptographic algorithm can also be called cipher. The readable format is also called plaintext while the encrypted or protected format is referred to as a ciphertext.

There are various classes of cipher, one of which is asymmetric-key algorithm or encryption, also known as public key encryption. In this algorithm, a pair of keys, one is called a public key and the other a private key, are involved. Each public key is made open to anyone and the corresponding private key is made confidential (secret).

PS: In encryption, a key is just a random string of data bits majorly used for arranging and disarranging data.

<em>Hope this helps!</em>

You might be interested in
What can you look for on a website to indicate that the information it presents is reliable?
dybincka [34]

There are several things you can look for on a website to help you figure out if the information is reliable. The first thing you should evaluate is the audience that the website is intended for. Is it intended for academics? School children? The general public?


The next thing you should look at is the author of the website. Is the author identified? Is the author an expert in their field? Can you establish the author's credibility? Is the author affiliated to an academic institution or credible organisation?


Look at the accuracy of the website. Check for spelling errors, proper grammar, and well-written text. Are there any sources cited? Are those sources credible?


You should also check to see when the information was published. Is the information up to date? Are all of the links up to date and functioning?


There is one last thing you can look at, and this is the domain of the website. Domains like .edu and .gov are more credible than .com or .net domains.

5 0
4 years ago
What are the third generation of computer?​
balu736 [363]

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry. The IC was invented by Jack Kilby.

3 0
3 years ago
Read 2 more answers
I am programming and i want to find the amount of move functions i need to complete the full square. the square is 65 by 70 circ
Ahat [919]
Not to be rude, but this is elementary school. How would anyone know this?
8 0
4 years ago
What type of stud is placed below a windowsill to support its weight
Vesnalui [34]
A <span>cripple stud is what is use for windows and doors 

</span>
6 0
3 years ago
Question 1 (10 points)
lisabon 2012 [21]

Answer:

Find and replace header and footer

5 0
3 years ago
Other questions:
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • What do you call a firewall that is connected to the internet, the internal network, and the dmz?
    13·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • What is the troubleshooting process?
    5·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • In Microsoft Word you can access the _______ command from the "Mini toolbar." 
    9·1 answer
  • Which command would you use to swap the words hither and yon on any line with any number of words between them? (You need not wo
    5·1 answer
  • ____________ reference is used when you want to use the same calculation across multiple rows or columns.
    10·2 answers
  • What is the purpose of a project overview?
    8·2 answers
  • 3 uses of a computer ​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!