How many keys are required for encryption and decryption of data when we use asymmetric cipher?
(a) 0
(b) 1
(c) 2
(d) 3
The question was asked during an internship interview.
This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II