Felix Olowononi

78%
Flag icon
It takes a significant amount of processing power to encrypt and decrypt data, especially when compared with symmetric encryption. Most cryptographic protocols that use asymmetric encryption only use it for key exchange.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview