
2. Based on current capabilities, what are the reasonable minimums for encryp- tion key strength for each of the following encryption techniques (include sources of information)? a. Hashing b. Symmetric encryption c. Asymmetric encryption Show transcribed image text
Expert Answer
An answer will be send to you shortly. . . . .