Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageAnswer: Asymmetric Encryption
Asymmetric Encryption (Public-Key Cryptography) uses two mathematically related keys: public key for encryption and private key for decryption. Examples include RSA, ECC, and Diffie-Hellman. It enables secure key exchange and digital signatures, unlike symmetric encryption which uses a single shared key.