Asymmetric and Symmetric encryption
This commit is contained in:
parent
3b0c955925
commit
26da34b786
@ -5246,10 +5246,16 @@ Access control based on user roles (i.e., a collection of access authorizations
|
|||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>Explain Symmetric encryption</summary><br><b>
|
<summary>Explain Symmetric encryption</summary><br><b>
|
||||||
|
|
||||||
|
A symmetric encryption is any technique where the same key is used to both encrypt and decrypt the data.
|
||||||
|
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary>Explain Asymmetric encryption</summary><br><b>
|
<summary>Explain Asymmetric encryption</summary><br><b>
|
||||||
|
|
||||||
|
A asymmetric encryption is any technique where the there is two different keys that are used for encryption and decryption, these keys are known as public key and private key.
|
||||||
|
|
||||||
</b></details>
|
</b></details>
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user