Computer Networks Public Key Cryptography
Q What are the two keys that are used in asymmetric key cryptography?
  • A A. Secret key and private key
  • B B. Private key and public key
  • C C. Public key and secured key
  • D D. Secured key and private key
Leave a Comment