Answer:
The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption. Though the keys are different, they are mathematically related and hence, retrieving the plaintext by decrypting ciphertext is feasible.
Previous Question | Next Question |
Explain me what port is for ICMP or pinging? | Tell me what is Cryptography? |