196k views
5 votes
A common approach for managing the issuance of asymmetric keys is based on the _____________________________ mechanism, which exists as a system of protocols, data formats, rules, and practices that enable large-scale systems to securely use public key cryptography

User Demmy
by
5.6k points

1 Answer

2 votes

Answer: RSA infrastructure

Step-by-step explanation:

Using this infrastructure we can implement asymmetric cryptography using a pair of public key and private key. It works on the mechanism that if one of the key is used for encryption the other key is used to decrypt the message.

User Shakil Ahmed
by
6.7k points