Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
bartleby

Concept explainers

Question
Book Icon
Chapter 8, Problem 11RQ
Program Plan Intro

Symmetric and asymmetric encryption:

The encryption technique uses the same secret key for sender and receiver to encrypt and decrypt the message is known as symmetric encryption.

The sender and receiver uses different keys for encryption and decryption is known as asymmetric encryption. It is otherwise known as public key cryptography.

Blurred answer
Students have asked these similar questions
What critical issue in symmetric and asymmetric encryption is resolved by using a hybrid method like Diffie-Hellman
What critical issue in symmetric and asymmetric encryption is addressed by a hybrid technique such as Diffie-Hellman?
Explore the benefits and drawbacks of symmetric encryption. How does one go about picking the right kind of encryption?