Scenarios

Practice

Say that there is a mailbox where anybody can drop messages addressed to you. However, only you have access to the key that allows you to open the entire mailbox and see what messages everyone has left for you.

Why is this scenario an example of asymmetric encryption?

In terms of encryption keys, what would have to change for this situation to be an example of symmetric encryption?

What is decryption?

Back