In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.
(a) Symmetric Key Encryption
(b) Asymmetric Key Encryption
(c) Asymmetric Key Decryption
(d) Hash-based Key Encryption
I have been asked this question by my college professor while I was bunking the class.
This intriguing question originated from Types of Cryptography in portion Cryptography in Security of Cyber Security