answersLogoWhite

0


Best Answer

Type your answer here... Asymmetric

Answer Explanation: Asymmetric encryption uses a key pair, a public key, and a private key for the encryption and decryption process. One key is used to encrypt the information, and the other key is used to decrypt it. Asymmetric encryption uses Rivest Shamir Adleman (RSA) as a common asymmetric solution to encrypt information.

It could be that the person posing the question was looking for SSL (or TLS) which use encryption to secure communications. While RSA is not the only encryption method accepted, both SSL and TLS can, and commonly DO, use RSA as the negotiated encryption scheme.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which encryption process uses two keys and includes RSA as a common solution?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What encryption process uses two keys and includes RSA as a common solution?

Secure Socket Layer (SSL) and Transport Layer Security (TLS) are both common encryption processes which accept RSA as a common method for encryption. Since RSA uses two keys (public and private) both SSL and TLS would satisfy the conditions of the question.


What are the phases of reengineering?

Developing solution is a common BPR phase that includes detailed process definition, system requirements writing and system development, training development, implementation planning, operational transition plan, pilots and trials.


Which layer of the OSI model is responsible for providing common daya formatting techniques such as encryption and terminal emulation?

presentation layer for data encryption and transport layer for web browser encryption


What common household chemical must you provide to process the neutralization for proper disposal of the black oxide blueing solution?

salt


Is encryption used as a technique to secure computer information?

Yes, it is a very common technique.


How do people use encryption in everyday life?

The most common application for encryption is in Internet browsing; whenever someone enters a "secure" website (indicated by shttp as the page protocol type) an encryption system is used to secure traffic between the user and the site.


What is the effect of common salt on turmeric solution?

common salt does not have much effect as it is a substance formed during the process of neutralization. thus it is neither acidic nor basic in nature.


What virus runs a program that searches for common data files compresses them and makes them unusable?

That would be an encryption. Encryptions are usually found within safe looking files and programmed macros.


Is common salt solution acidic or basic?

neither, a common salt solution is neutral


What is an example of a common solution?

Common solutions


What kind of noun is solution?

The noun 'solution' is a singular, common noun.The noun solution is a concrete noun as a word fora homogeneous molecular mixture of two or more substances.The noun solution is an abstract noun as a word forthe act or process of solving a problem; the state of being solved; an answer to a problem.


Is milk a common neutral solution?

No milk is not a neutral solution