Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What’s the difference between Symmetric and Asymmetric encryption?



What’s the difference between Symmetric and Asymmetric encryption?..

Answer / chaitanya

To boil down an extremely complicated topic into a few short words, Symmetric encryption uses the same key to encrypt and decrypt, while Asymmetric uses different keys for encryption and decryption. Symmetric is usually much faster, but is difficult to implement most times due to the fact that you would have to transfer the key over an unencrypted channel. Therefore many times an Asymmetric connection will be established first, then send creates the Symmetric connection. 

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Computer Security Interview Questions

How many security protocols available?

1 Answers  


What do you think of social networking sites such as Facebook and LinkedIn?

1 Answers  


On a Windows network, why is it easier to break into a local account than an AD account?

1 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


 What is the difference between an HIDS and a NIDS?

1 Answers  


Does indexing slow down computer?

0 Answers  


 What’s the difference between a White Box test and a Black Box test?

2 Answers  


What is the difference between a virus and a trojan?

0 Answers   Tavant Technologies, Zensar,


What are the most common computer applications?

0 Answers  


 What is the Chain of Custody?

1 Answers  


 What is Exfiltration?

0 Answers  


You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)