SOC Experts Community - Beta
0 like 0 dislike
in Security Concepts by (1.2k points)

1 Answer

0 like 0 dislike
by (5k points)

Asymmetric Encryption uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption.

for more info refer

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses