Final answer:
option a.Asymmetric-key encryption is also known as public-key encryption and uses two keys for security, hence sometimes called two-key encryption. It faces challenges with key management and distribution.
Step-by-step explanation:
The correct statements regarding asymmetric-key encryption methods are as follows:
- A. asymmetric-key encryption is also called public-key encryption.
- B. asymmetric-key encryption is also called two-key encryption.
- C. asymmetric-key encryption method has problems in key distribution and key management.
Asymmetric-key encryption, also known as public-key encryption, uses two different keys for encrypting and decrypting data: a public key, which is shared with everyone, and a private key, which is kept secret. This is why it is sometimes referred to as two-key encryption. While it provides strong security, it entails challenges associated with key management and distribution since ensuring the secure exchange and storage of private keys is critical.