Complete the sentence to describe asymmetric encryption.
In asymmetric encryption, the [1] key is used to encrypt data.The public key is used to encrypt data in asymmetric encryption, while the private key is used to decrypt it.
Complete the sentence to explain RSA key generation.
RSA key generation involves selecting two large [1] numbers.RSA keys are generated by selecting two large prime numbers to create the public and private keys.
Fix the error in the explanation of ECC.
ECC uses [1] curves over finite fields for encryption.
ECC stands for Elliptic Curve Cryptography, which uses elliptic curves over finite fields.
Fill both blanks to complete the description of asymmetric encryption keys.
The [1] key is kept secret, while the [2] key is shared publicly.
In asymmetric encryption, the private key is kept secret by the owner, and the public key is shared with others.
Fill all three blanks to complete the RSA encryption formula.
Ciphertext = (Plaintext [1] PublicKey) [2] Modulus; Decryption uses [3] key.
RSA encryption raises the plaintext to the power of the public key exponent, then takes the modulus. Decryption uses the private key.