M

Mr. Dubey • 97.30K Points
Coach

Q. In same keys are implemented for encrypting as well as decrypting the information.

  • (A) symmetric key encryption
  • (B) asymmetric key encryption
  • (C) asymmetric key decryption
  • (D) hash-based key encryption
Share

No solution found for this question.
Add Solution and get +2 points.

You must be Logged in to update hint/solution

Discusssion

Login to discuss.


Question analytics