Dual key: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Classify page.) |
imported>Doug Williamson (Add link.) |
||
(One intermediate revision by the same user not shown) | |||
Line 8: | Line 8: | ||
== See also == | == See also == | ||
* [[Cybersecurity]] | * [[Cybersecurity]] | ||
* [[Encryption]] | |||
* [[Key]] | |||
* [[Public key encryption]] | * [[Public key encryption]] | ||
[[Category:Manage_risks]] | [[Category:Manage_risks]] | ||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 07:40, 22 June 2023
Cybersecurity.
Dual key encryption uses a pair of keys to send encrypted messages.
Information encrypted by one key can be decrypted by the other.