Westonci.ca is the ultimate Q&A platform, offering detailed and reliable answers from a knowledgeable community. Discover a wealth of knowledge from experts across different disciplines on our comprehensive Q&A platform. Our platform offers a seamless experience for finding reliable answers from a network of knowledgeable professionals.
Sagot :
Symmetric Encryption:
Same key is used for Encryption and Decryption
Both server and client should have same key for encryption
Vulnerable to attack
Examples: Blowfish, AES, RC4, DES, RC5, and RC6
Asymmetric encryption:
Server generates its own public and private key
Client generates its own public and private key
Server and client exchanges their public keys
Server uses client’s public key to encrypt data
Client uses server ‘s public key to encrypt data
Server uses its private key to decrypt data sent by client
Client uses its private key to decrypt data sent by server
example: EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.
Hi there , Hope I helped !
Thank you for choosing our platform. We're dedicated to providing the best answers for all your questions. Visit us again. Thank you for choosing our platform. We're dedicated to providing the best answers for all your questions. Visit us again. Stay curious and keep coming back to Westonci.ca for answers to all your burning questions.